First published: Wed Dec 10 2014(Updated: )
WebKit in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1 allows remote attackers to bypass the Same Origin Policy via crafted Cascading Style Sheets (CSS) token sequences within an SVG file in the SRC attribute of an IMG element.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <=7.0.1 | |
Apple iPhone OS | <=8.1.2 | |
Apple Safari | <=6.2.0 | |
Apple Safari | =7.1.0 | |
Apple Safari | =8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4465 has been classified as a medium severity vulnerability due to its potential to allow bypassing of the Same Origin Policy.
The fix for CVE-2014-4465 involves updating affected versions of Apple Safari to the latest version available, specifically 6.2.1 or later, 7.1.1 or later, and 8.0.1 or later.
CVE-2014-4465 affects Apple Safari versions before 6.2.1, 7.x versions before 7.1.1, and 8.x versions before 8.0.1, as well as certain versions of tvOS and iPhone OS.
CVE-2014-4465 enables remote attackers to perform cross-origin attacks by bypassing the Same Origin Policy through crafted CSS token sequences in SVG files.
There are no known mitigations for CVE-2014-4465 aside from upgrading to the patched versions of the affected software.