First published: Wed Apr 23 2014(Updated: )
IOKit in Apple iOS before 7.1.1, Apple OS X through 10.9.2, and Apple TV before 6.1.1 places kernel pointers into an object data structure, which makes it easier for local users to bypass the ASLR protection mechanism by reading unspecified attributes of the object.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | <=10.9.2 | |
macOS Yosemite | =10.9 | |
macOS Yosemite | =10.9.1 | |
Apple iPhone OS | <=7.1 | |
Apple iPhone OS | =7.0 | |
Apple iPhone OS | =7.0.1 | |
Apple iPhone OS | =7.0.2 | |
Apple iPhone OS | =7.0.3 | |
Apple iPhone OS | =7.0.4 | |
Apple iPhone OS | =7.0.5 | |
Apple iPhone OS | =7.0.6 | |
tvOS | <=6.1 | |
tvOS | =6.0 | |
tvOS | =6.0.1 | |
tvOS | =6.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1320 has a medium severity rating, indicating a significant risk of exploitation under specific conditions.
To remediate CVE-2014-1320, update your device to the latest available version of iOS, OS X, or tvOS that addresses this vulnerability.
CVE-2014-1320 affects users of Apple iOS before 7.1.1, OS X through 10.9.2, and tvOS before 6.1.1.
CVE-2014-1320 is a local privilege escalation vulnerability that allows users to bypass ASLR protections.
Exploitation of CVE-2014-1320 could allow local attackers to execute arbitrary code with kernel privileges.