First published: Thu Feb 27 2014(Updated: )
Buffer overflow in Apple Type Services (ATS) in Apple OS X before 10.9.2 allows attackers to bypass the App Sandbox protection mechanism via crafted Mach messages.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.9.1 | |
Apple iOS and macOS | =10.7.0 | |
Apple iOS and macOS | =10.7.1 | |
Apple iOS and macOS | =10.7.2 | |
Apple iOS and macOS | =10.7.3 | |
Apple iOS and macOS | =10.7.4 | |
Apple iOS and macOS | =10.7.5 | |
Apple iOS and macOS | =10.8.0 | |
Apple iOS and macOS | =10.8.1 | |
Apple iOS and macOS | =10.8.2 | |
Apple iOS and macOS | =10.8.3 | |
Apple iOS and macOS | =10.8.4 | |
Apple iOS and macOS | =10.8.5 | |
Apple iOS and macOS | =10.8.5-supplemental_update | |
Apple iOS and macOS | =10.9 | |
Apple macOS Server | =10.7.0 | |
Apple macOS Server | =10.7.1 | |
Apple macOS Server | =10.7.2 | |
Apple macOS Server | =10.7.3 | |
Apple macOS Server | =10.7.4 | |
Apple macOS Server | =10.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1256 has been rated as high severity due to its potential to bypass App Sandbox protections.
To fix CVE-2014-1256, upgrade to OS X version 10.9.2 or later, as this version includes the necessary patches.
CVE-2014-1256 affects Apple OS X versions prior to 10.9.2, including 10.7.x and 10.8.x.
Yes, CVE-2014-1256 can be exploited remotely through crafted Mach messages.
The potential impacts of CVE-2014-1256 include unauthorized access and execution of malicious code, compromising system integrity.