First published: Wed Apr 23 2014(Updated: )
WindowServer in Apple OS X through 10.9.2 does not prevent session creation by a sandboxed application, which allows attackers to bypass the sandbox protection mechanism and execute arbitrary code via a crafted application.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.9.2 | |
Apple iOS and macOS | =10.9 | |
Apple iOS and macOS | =10.9.1 | |
Apple iOS and macOS | =10.8.0 | |
Apple iOS and macOS | =10.8.1 | |
Apple iOS and macOS | =10.8.2 | |
Apple iOS and macOS | =10.8.3 | |
Apple iOS and macOS | =10.8.4 | |
Apple iOS and macOS | =10.8.5 | |
Apple iOS and macOS | =10.8.5-supplemental_update |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1314 is categorized as a medium severity vulnerability.
CVE-2014-1314 allows exploitation by enabling sandboxed applications to create sessions, thereby bypassing sandbox protections.
CVE-2014-1314 affects macOS versions 10.8.0 through 10.9.2.
The recommended mitigation for CVE-2014-1314 is to upgrade to a version of macOS that is above 10.9.2.
CVE-2014-1314 can be leveraged to execute arbitrary code via malicious applications that exploit the sandbox bypass.