First published: Tue Jul 01 2014(Updated: )
Secure Transport in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 does not ensure that a DTLS message is accepted only for a DTLS connection, which allows remote attackers to obtain potentially sensitive information from uninitialized process memory by providing a DTLS message within a TLS connection.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | =10.9 | |
Apple iOS and macOS | =10.9.1 | |
Apple iOS and macOS | =10.9.2 | |
Apple iOS and macOS | =10.9.3 | |
iStyle @cosme iPhone OS | <=7.1.1 | |
iStyle @cosme iPhone OS | =7.0 | |
iStyle @cosme iPhone OS | =7.0.1 | |
iStyle @cosme iPhone OS | =7.0.2 | |
iStyle @cosme iPhone OS | =7.0.3 | |
iStyle @cosme iPhone OS | =7.0.4 | |
iStyle @cosme iPhone OS | =7.0.5 | |
iStyle @cosme iPhone OS | =7.0.6 | |
iStyle @cosme iPhone OS | =7.1 | |
tvOS | <=6.1.1 | |
tvOS | =6.0 | |
tvOS | =6.0.1 | |
tvOS | =6.0.2 | |
tvOS | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1361 is classified as a high severity vulnerability due to its potential to expose sensitive information.
To mitigate CVE-2014-1361, update your Apple iOS, macOS, or tvOS to the latest version, as the issue has been addressed in subsequent releases.
CVE-2014-1361 affects Apple iOS versions prior to 7.1.2, OS X versions prior to 10.9.4, and Apple TV versions prior to 6.1.2.
CVE-2014-1361 is a memory corruption vulnerability that occurs due to improper management of DTLS connections.
Although you can still use your device, it is highly recommended to apply the available security updates to protect against CVE-2014-1361.