First published: Tue Jul 01 2014(Updated: )
Heap-based buffer overflow in launchd in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 allows attackers to execute arbitrary code via a crafted application that sends IPC messages.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.9 | |
macOS Yosemite | =10.9.1 | |
macOS Yosemite | =10.9.2 | |
macOS Yosemite | =10.9.3 | |
Apple iPhone OS | <=7.1.1 | |
Apple iPhone OS | =7.0 | |
Apple iPhone OS | =7.0.1 | |
Apple iPhone OS | =7.0.2 | |
Apple iPhone OS | =7.0.3 | |
Apple iPhone OS | =7.0.4 | |
Apple iPhone OS | =7.0.5 | |
Apple iPhone OS | =7.0.6 | |
Apple iPhone OS | =7.1 | |
tvOS | <=6.1.1 | |
tvOS | =6.0 | |
tvOS | =6.0.1 | |
tvOS | =6.0.2 | |
tvOS | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1356 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2014-1356, users should update their Apple devices to iOS 7.1.2, OS X 10.9.4, or tvOS 6.1.2.
CVE-2014-1356 affects Apple iOS versions prior to 7.1.2, OS X versions prior to 10.9.4, and tvOS versions prior to 6.1.2.
CVE-2014-1356 enables attackers to execute arbitrary code via specially crafted IPC messages.
CVE-2014-1356 was reported publicly in June 2014.