First published: Wed Apr 23 2014(Updated: )
CFNetwork in Apple iOS before 7.1.1, Apple OS X through 10.9.2, and Apple TV before 6.1.1 does not ensure that a Set-Cookie HTTP header is complete before interpreting the header's value, which allows remote attackers to bypass intended access restrictions by triggering the closing of a TCP connection during transmission of a header, as demonstrated by an HTTPOnly restriction.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iPhone OS | <=7.1 | |
iPhone OS | =7.0 | |
iPhone OS | =7.0.1 | |
iPhone OS | =7.0.2 | |
iPhone OS | =7.0.3 | |
iPhone OS | =7.0.4 | |
iPhone OS | =7.0.5 | |
iPhone OS | =7.0.6 | |
Apple iOS and macOS | =10.8.0 | |
Apple iOS and macOS | =10.8.1 | |
Apple iOS and macOS | =10.8.2 | |
Apple iOS and macOS | =10.8.3 | |
Apple iOS and macOS | =10.8.4 | |
Apple iOS and macOS | =10.8.5 | |
Apple iOS and macOS | =10.8.5-supplemental_update | |
Apple iOS and macOS | <=10.9.2 | |
Apple iOS and macOS | =10.9 | |
Apple iOS and macOS | =10.9.1 | |
Apple iOS and macOS | =10.7.0 | |
Apple iOS and macOS | =10.7.1 | |
Apple iOS and macOS | =10.7.2 | |
Apple iOS and macOS | =10.7.3 | |
Apple iOS and macOS | =10.7.4 | |
Apple iOS and macOS | =10.7.5 | |
Apple iOS and macOS | =10.7.0 | |
Apple iOS and macOS | =10.7.1 | |
Apple iOS and macOS | =10.7.2 | |
Apple iOS and macOS | =10.7.3 | |
Apple iOS and macOS | =10.7.4 | |
Apple iOS and macOS | =10.7.5 | |
tvOS | <=6.1 | |
tvOS | =6.0 | |
tvOS | =6.0.1 | |
tvOS | =6.0.2 | |
<=7.1 | ||
=7.0 | ||
=7.0.1 | ||
=7.0.2 | ||
=7.0.3 | ||
=7.0.4 | ||
=7.0.5 | ||
=7.0.6 | ||
=10.8.0 | ||
=10.8.1 | ||
=10.8.2 | ||
=10.8.3 | ||
=10.8.4 | ||
=10.8.5 | ||
=10.8.5-supplemental_update | ||
<=10.9.2 | ||
=10.9 | ||
=10.9.1 | ||
=10.7.0 | ||
=10.7.1 | ||
=10.7.2 | ||
=10.7.3 | ||
=10.7.4 | ||
=10.7.5 | ||
=10.7.0 | ||
=10.7.1 | ||
=10.7.2 | ||
=10.7.3 | ||
=10.7.4 | ||
=10.7.5 | ||
<=6.1 | ||
=6.0 | ||
=6.0.1 | ||
=6.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1296 has been assigned a severity rating that allows remote attackers to bypass access restrictions affecting Apple iOS, macOS, and tvOS.
To fix CVE-2014-1296, update your Apple device to the latest version of the operating system, which addresses this vulnerability.
CVE-2014-1296 affects Apple iOS versions prior to 7.1.1, macOS versions up to 10.9.2, and tvOS versions prior to 6.1.1.
Exploitation of CVE-2014-1296 can allow remote attackers to manipulate HTTP Set-Cookie headers, leading to unauthorized access.
CVE-2014-1296 is recognized as a notable vulnerability due to its impact on multiple Apple platforms, affecting a wide user base.