First published: Fri Jan 30 2015(Updated: )
The extension APIs in the kernel in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 do not prevent the presence of addresses within an OSBundleMachOHeaders key in a response, which makes it easier for attackers to bypass the ASLR protection mechanism via a crafted app.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iOS | <=8.1.2 | |
Apple iOS and macOS | <=10.10.1 | |
tvOS | <=7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4491 is considered a high severity vulnerability due to its potential to bypass ASLR protection.
To fix CVE-2014-4491, you should update your Apple iOS, macOS, or tvOS to the latest version available.
CVE-2014-4491 affects Apple iOS before 8.1.3, macOS before 10.10.2, and tvOS before 7.0.3.
Mitigations for CVE-2014-4491 include implementing stricter checks on OSBundleMachOHeaders to prevent address exposure.
There are no widely recognized workarounds for CVE-2014-4491; the primary resolution is to update the affected systems.