First published: Sat Oct 18 2014(Updated: )
Mail Service in Apple OS X Server before 4.0 does not enforce SACL changes until after a service restart, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging a change made by an administrator.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X Server | <=3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4446 is considered a medium severity vulnerability due to its ability to allow unauthorized access to services.
To fix CVE-2014-4446, restart the Apple OS X Server mail service after making any changes to SACL settings.
CVE-2014-4446 affects Apple OS X Server versions prior to 4.0, specifically up to and including 3.1.2.
CVE-2014-4446 can be exploited by remote authenticated users who take advantage of SACL changes not being enforced until a service restart.
The impact of CVE-2014-4446 allows remote authenticated users to bypass intended access restrictions in certain conditions.