First published: Thu Feb 27 2014(Updated: )
Apple Type Services (ATS) in Apple OS X before 10.9.2 allows attackers to bypass the App Sandbox protection mechanism via crafted Mach messages that trigger memory corruption.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | <=10.9.1 | |
macOS Yosemite | =10.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1262 has a high severity rating due to its capability to bypass the App Sandbox protection mechanism.
To fix CVE-2014-1262, update your macOS to version 10.9.2 or later.
CVE-2014-1262 affects Apple OS X versions prior to 10.9.2, specifically 10.9 and 10.9.1.
CVE-2014-1262 is a memory corruption vulnerability that allows attackers to bypass security mechanisms.
Yes, CVE-2014-1262 can potentially be exploited remotely through crafted Mach messages.