First published: Fri Jan 24 2014(Updated: )
Double free vulnerability in Apple Pages 2.x before 2.1 and 5.x before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Word file.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Pages | =2.0 | |
Apple Pages | =2.0.1 | |
Apple Pages | =2.0.2 | |
Apple Pages | =5.0 | |
Apple Pages | =5.0.1 | |
macOS Yosemite | <=10.9.1 | |
Apple iPhone OS | <=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1252 is classified as a high severity vulnerability due to its potential for remote code execution and denial of service.
To fix CVE-2014-1252, upgrade to Apple Pages version 2.1 or later for 2.x, and version 5.1 or later for 5.x.
CVE-2014-1252 affects Apple Pages versions 2.0 through 2.0.2 and 5.0 through 5.0.1, as well as specific versions of macOS and iPhone OS up to 10.9.1 and 7.0 respectively.
An attacker can use a crafted Microsoft Word file to exploit CVE-2014-1252, potentially leading to arbitrary code execution or crashing the application.
Currently, there are no publicly documented workarounds for CVE-2014-1252 other than upgrading to a safe version of Apple Pages.