First published: Fri Mar 14 2014(Updated: )
dyld in Apple iOS before 7.1 and Apple TV before 6.1 allows attackers to bypass code-signing requirements by leveraging use of text-relocation instructions in a dynamic library.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <=6.0.2 | |
tvOS | =6.0 | |
tvOS | =6.0.1 | |
iPhone OS | <=7.0.6 | |
iPhone OS | =7.0 | |
iPhone OS | =7.0.1 | |
iPhone OS | =7.0.2 | |
iPhone OS | =7.0.3 | |
iPhone OS | =7.0.4 | |
iPhone OS | =7.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1273 is considered to be a high severity vulnerability due to its potential to allow attackers to bypass code-signing protections.
To fix CVE-2014-1273, users should update their iOS devices to version 7.1 or later and Apple TV devices to version 6.1 or later.
CVE-2014-1273 affects Apple iOS devices before version 7.1 and Apple TV devices before version 6.1.
Yes, CVE-2014-1273 can potentially be exploited remotely due to the nature of dynamic libraries and code-signing bypass.
CVE-2014-1273 is a code-signing bypass vulnerability that allows execution of unauthorized code in affected Apple devices.