First published: Fri Jan 30 2015(Updated: )
libnetcore in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not verify that certain values have the expected data type, which allows attackers to execute arbitrary code in an _networkd context via a crafted XPC message from a sandboxed app, as demonstrated by lack of verification of the XPC dictionary data type.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <=8.1.2 | |
macOS Yosemite | <=10.10.1 | |
tvOS | <=7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4492 is considered a high severity vulnerability due to its potential to allow execution of arbitrary code.
To fix CVE-2014-4492, users should update their Apple devices to the latest software version that is not vulnerable.
CVE-2014-4492 affects Apple iOS versions before 8.1.3, OS X versions before 10.10.2, and tvOS versions before 7.0.3.
CVE-2014-4492 can be exploited through crafted XPC messages sent from a sandboxed app, leading to arbitrary code execution.
There are no documented workarounds for CVE-2014-4492; the best mitigation is to apply software updates.