First published: Wed Dec 10 2014(Updated: )
WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <=12.1 | |
iStyle @cosme iPhone OS | <=8.1.2 | |
tvOS | <=7.0.1 | |
Apple Mobile Safari | <=6.2.0 | |
Apple Mobile Safari | =7.0 | |
Apple Mobile Safari | =7.0.1 | |
Apple Mobile Safari | =7.0.2 | |
Apple Mobile Safari | =7.0.3 | |
Apple Mobile Safari | =7.0.4 | |
Apple Mobile Safari | =7.0.5 | |
Apple Mobile Safari | =7.0.6 | |
Apple Mobile Safari | =7.1.0 | |
Apple Mobile Safari | =8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4473 has a medium severity rating as it allows remote attackers to execute arbitrary code or cause a denial of service.
To fix CVE-2014-4473, upgrade to Apple Safari version 6.2.1 or later, or update your affected devices with the latest security patches.
CVE-2014-4473 affects Apple Safari versions prior to 6.2.1, as well as specific versions of iTunes, iPhone OS, and tvOS.
The risks associated with CVE-2014-4473 include the potential for remote code execution and application crashes leading to denial of service.
Users of affected software should immediately update their applications and devices to the latest versions to mitigate the risks posed by CVE-2014-4473.