First published: Fri Jan 30 2015(Updated: )
The mach_port_kobject interface in the kernel in Apple iOS before 8.1.3 and Apple TV before 7.0.3 does not properly restrict kernel-address and heap-permutation information, which makes it easier for attackers to bypass the ASLR protection mechanism via a crafted app.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=8.1.2 | |
tvOS | <=7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4496 has been rated as a high severity vulnerability due to its impact on the ASLR protection mechanism.
To mitigate CVE-2014-4496, users should update their Apple iOS devices to version 8.1.3 or later, or Apple TV to version 7.0.3 or later.
CVE-2014-4496 affects Apple iOS versions before 8.1.3 and Apple TV versions before 7.0.3.
CVE-2014-4496 exploits the mach_port_kobject interface vulnerability that allows attackers to bypass the ASLR protection mechanism.
While specific public exploits for CVE-2014-4496 may not be disclosed, the vulnerability poses a significant risk that can be exploited through crafted applications.