First published: Wed Apr 23 2014(Updated: )
The kernel in Apple OS X through 10.9.2 places a kernel pointer into an XNU object data structure accessible from user space, which makes it easier for local users to bypass the ASLR protection mechanism by reading an unspecified attribute of the object.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.9.2 | |
Apple iOS and macOS | =10.9 | |
Apple iOS and macOS | =10.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-1322 is considered high due to its potential to allow local users to bypass ASLR protections.
To fix CVE-2014-1322, update your macOS to a version later than 10.9.2.
CVE-2014-1322 affects Apple OS X versions up to and including 10.9.2.
Yes, exploitation of CVE-2014-1322 can facilitate further attacks by bypassing ASLR protection.
CVE-2014-1322 can be exploited by local users with access to the affected system.