First published: Sat Oct 18 2014(Updated: )
The Code Signing feature in Apple OS X before 10.10 does not properly handle incomplete resource envelopes in signed bundles, which allows remote attackers to bypass intended app-author restrictions by omitting an execution-related resource.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4391 has been classified as a moderate severity vulnerability due to its ability to bypass app-author restrictions.
To fix CVE-2014-4391, users should update to OS X 10.10 or later, where the vulnerability is addressed.
CVE-2014-4391 affects Apple OS X versions prior to 10.10, specifically those up to and including 10.9.4.
CVE-2014-4391 can be exploited by remote attackers to bypass intended restrictions on applications.
Exploitation of CVE-2014-4391 does not require user intervention, making it potentially more dangerous.