ID

VAR-201401-0568


CVE

CVE-2014-1252


TITLE

Apple Pages Updates for vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2014-001239

DESCRIPTION

Double free vulnerability in Apple Pages 2.x before 2.1 and 5.x before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Word file. Apple Pages is prone to a remote code-execution vulnerability. A remote attacker can leverage this issue to execute arbitrary code in the context of the user running the application. Failed exploit attempts may result in a denial-of-service condition. Apple Pages is a set of word processing and page layout applications (APP) of Apple (Apple), which supports the creation and sharing of documents, newsletters, reports and many other contents. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-03-10-1 iOS 7.1 iOS 7.1 is now available and addresses the following: Backup Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A maliciously crafted backup can alter the filesystem Description: A symbolic link in a backup would be restored, allowing subsequent operations during the restore to write to the rest of the filesystem. Configuration Profiles Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Profile expiration dates were not honored Description: Expiration dates of mobile configuration profiles were not evaluated correctly. CVE-ID CVE-2014-1271 : Filippo Bigarella Crash Reporting Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A local user may be able to change permissions on arbitrary files Description: CrashHouseKeeping followed symbolic links while changing permissions on files. This issue was addressed by not following symbolic links when changing permissions on files. CVE-ID CVE-2014-1272 : evad3rs dyld Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Code signing requirements may be bypassed Description: Text relocation instructions in dynamic libraries may be loaded by dyld without code signature validation. CVE-ID CVE-2014-1273 : evad3rs FaceTime Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to access FaceTime contacts from the lock screen Description: FaceTime contacts on a locked device could be exposed by making a failed FaceTime call from the lock screen. CVE-ID CVE-2013-6629 : Michal Zalewski IOKit HID Event Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may monitor on user actions in other apps Description: An interface in IOKit framework allowed malicious apps to monitor on user actions in other apps. CVE-ID CVE-2014-1276 : Min Zheng, Hui Xue, and Dr. Tao (Lenx) Wei of FireEye iTunes Store Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A man-in-the-middle attacker may entice a user into downloading a malicious app via Enterprise App Download Description: An attacker with a privileged network position could spoof network communications to entice a user into downloading a malicious app. This issue was mitigated by using SSL and prompting the user during URL redirects. CVE-ID CVE-2014-1252 : Felix Groebert of the Google Security Team Photos Backend Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Deleted images may still appear in the Photos app underneath transparent images Description: Deleting an image from the asset library did not delete cached versions of the image. CVE-ID CVE-2014-1281 : Walter Hoelblinger of Hoelblinger.com, Morgan Adams, Tom Pennington Profiles Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A configuration profile may be hidden from the user Description: A configuration profile with a long name could be loaded onto the device but was not displayed in the profile UI. CVE-ID CVE-2014-1282 : Assaf Hefetz, Yair Amit and Adi Sharabani of Skycure Safari Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: User credentials may be disclosed to an unexpected site via autofill Description: Safari may have autofilled user names and passwords into a subframe from a different domain than the main frame. CVE-ID CVE-2013-5227 : Niklas Malmgren of Klarna AB Settings - Accounts Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to disable Find My iPhone without entering an iCloud password Description: A state management issue existed in the handling of the Find My iPhone state. CVE-ID CVE-2014-1284 Springboard Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to see the home screen of the device even if the device has not been activated Description: An unexpected application termination during activation could cause the phone to show the home screen. CVE-ID CVE-2014-1285 : Roboboi99 SpringBoard Lock Screen Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A remote attacker may be able to cause the lock screen to become unresponsive Description: A state management issue existed in the lock screen. CVE-ID CVE-2014-1286 : Bogdan Alecu of M-sec.net TelephonyUI Framework Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A webpage could trigger a FaceTime audio call without user interaction Description: Safari did not consult the user before launching facetime-audio:// URLs. CVE-ID CVE-2013-2909 : Atte Kettunen of OUSPG CVE-2013-2926 : cloudfuzzer CVE-2013-2928 : Google Chrome Security Team CVE-2013-5196 : Google Chrome Security Team CVE-2013-5197 : Google Chrome Security Team CVE-2013-5198 : Apple CVE-2013-5199 : Apple CVE-2013-5225 : Google Chrome Security Team CVE-2013-5228 : Keen Team (@K33nTeam) working with HP's Zero Day Initiative CVE-2013-6625 : cloudfuzzer CVE-2013-6635 : cloudfuzzer CVE-2014-1269 : Apple CVE-2014-1270 : Apple CVE-2014-1289 : Apple CVE-2014-1290 : ant4g0nist (SegFault) working with HP's Zero Day Initiative, Google Chrome Security Team CVE-2014-1291 : Google Chrome Security Team CVE-2014-1292 : Google Chrome Security Team CVE-2014-1293 : Google Chrome Security Team CVE-2014-1294 : Google Chrome Security Team Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "7.1". -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-02-25-1 OS X Mavericks 10.9.2 and Security Update 2014-001 OS X Mavericks 10.9.2 and Security Update 2014-001 is now available and addresses the following: Apache Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Multiple vulnerabilities in Apache Description: Multiple vulnerabilities existed in Apache, the most serious of which may lead to cross-site scripting. These issues were addressed by updating Apache to version 2.2.26. CVE-ID CVE-2013-1862 CVE-2013-1896 App Sandbox Available for: OS X Mountain Lion v10.8.5 Impact: The App Sandbox may be bypassed Description: The LaunchServices interface for launching an application allowed sandboxed apps to specify the list of arguments passed to the new process. A compromised sandboxed application could abuse this to bypass the sandbox. This issue was addressed by preventing sandboxed applications from specifying arguments. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2013-5179 : Friedrich Graeter of The Soulmen GbR ATS Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of handling of Type 1 fonts. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1254 : Felix Groebert of the Google Security Team ATS Available for: OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: A memory corruption issue existed in the handling of Mach messages passed to ATS. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1262 : Meder Kydyraliev of the Google Security Team ATS Available for: OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: An arbitrary free issue existed in the handling of Mach messages passed to ATS. This issue was addressed through additional validation of Mach messages. CVE-ID CVE-2014-1255 : Meder Kydyraliev of the Google Security Team ATS Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: A buffer overflow issue existed in the handling of Mach messages passed to ATS. This issue was addressed by additional bounds checking. CVE-ID CVE-2014-1256 : Meder Kydyraliev of the Google Security Team Certificate Trust Policy Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Root certificates have been updated Description: The set of system root certificates has been updated. The complete list of recognized system roots may be viewed via the Keychain Access application. CFNetwork Cookies Available for: OS X Mountain Lion v10.8.5 Impact: Session cookies may persist even after resetting Safari Description: Resetting Safari did not always delete session cookies until Safari was closed. This issue was addressed through improved handling of session cookies. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2014-1257 : Rob Ansaldo of Amherst College, Graham Bennett CoreAnimation Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Visiting a maliciously crafted site may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow existed in CoreAnimation's handling of images. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1258 : Karl Smith of NCC Group CoreText Available for: OS X Mavericks 10.9 and 10.9.1 Impact: Applications that use CoreText may be vulnerable to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in CoreText in the handling of Unicode fonts. This issue is addressed through improved bounds checking. CVE-ID CVE-2014-1261 : Lucas Apa and Carlos Mario Penagos of IOActive Labs curl Available for: OS X Mavericks 10.9 and 10.9.1 Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: When using curl to connect to an HTTPS URL containing an IP address, the IP address was not validated against the certificate. This issue does not affect systems prior to OS X Mavericks v10.9. CVE-ID CVE-2014-1263 : Roland Moriz of Moriz GmbH Data Security Available for: OS X Mavericks 10.9 and 10.9.1 Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS Description: Secure Transport failed to validate the authenticity of the connection. This issue was addressed by restoring missing validation steps. CVE-ID CVE-2014-1266 Date and Time Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: An unprivileged user may change the system clock Description: This update changes the behavior of the systemsetup command to require administrator privileges to change the system clock. CVE-ID CVE-2014-1265 File Bookmark Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a file with a maliciously crafted name may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of file names. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1259 Finder Available for: OS X Mavericks 10.9 and 10.9.1 Impact: Accessing a file's ACL via Finder may lead to other users gaining unauthorized access to files Description: Accessing a file's ACL via Finder may corrupt the ACLs on the file. This issue was addressed through improved handling of ACLs. CVE-ID CVE-2014-1264 ImageIO Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a maliciously crafted JPEG file may lead to the disclosure of memory contents Description: An uninitialized memory access issue existed in libjpeg's handling of JPEG markers, resulting in the disclosure of memory contents. This issue was addressed by better JPEG handling. CVE-ID CVE-2013-6629 : Michal Zalewski IOSerialFamily Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5 Impact: Executing a malicious application may result in arbitrary code execution within the kernel Description: An out of bounds array access existed in the IOSerialFamily driver. This issue was addressed through additional bounds checking. This issue does not affect systems running OS X Mavericks v10.9 or later. CVE-ID CVE-2013-5139 : @dent1zt LaunchServices Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5 Impact: A file could show the wrong extension Description: An issue existed in the handling of certain unicode characters that could allow filenames to show incorrect extensions. The issue was addressed by filtering unsafe unicode characters from display in filenames. This issue does not affect systems running OS X Mavericks v10.9 or later. CVE-ID CVE-2013-5178 : Jesse Ruderman of Mozilla Corporation, Stephane Sudre of Intego NVIDIA Drivers Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Executing a malicious application could result in arbitrary code execution within the graphics card Description: An issue existed that allowed writes to some trusted memory on the graphics card. This issue was addressed by removing the ability of the host to write to that memory. CVE-ID CVE-2013-5986 : Marcin Koƛcielnicki from the X.Org Foundation Nouveau project CVE-2013-5987 : Marcin Koƛcielnicki from the X.Org Foundation Nouveau project PHP Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP, the most serious of which may have led to arbitrary code execution. These issues were addressed by updating PHP to version 5.4.22 on OS X Mavericks v10.9, and 5.3.28 on OS X Lion and Mountain Lion. CVE-ID CVE-2013-4073 CVE-2013-4113 CVE-2013-4248 CVE-2013-6420 QuickLook Available for: OS X Mountain Lion v10.8.5 Impact: Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in QuickLook's handling of Microsoft Office files. Downloading a maliciously crafted Microsoft Office file may have led to an unexpected application termination or arbitrary code execution. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2014-1260 : Felix Groebert of the Google Security Team QuickLook Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Downloading a maliciously crafted Microsoft Word document may lead to an unexpected application termination or arbitrary code execution Description: A double free issue existed in QuickLook's handling of Microsoft Word documents. This issue was addressed through improved memory management. CVE-ID CVE-2014-1252 : Felix Groebert of the Google Security Team QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of 'ftab' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1246 : An anonymous researcher working with HP's Zero Day Initiative QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of 'dref' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1247 : Tom Gallagher & Paul Bates working with HP's Zero Day Initiative QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of 'ldat' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1248 : Jason Kratzer working with iDefense VCP QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a maliciously crafted PSD image may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of PSD images. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1249 : dragonltx of Tencent Security Team QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An out of bounds byte swapping issue existed in the handling of 'ttfo' elements. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1250 : Jason Kratzer working with iDefense VCP QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in the handling of 'stsz' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1245 : Tom Gallagher & Paul Bates working with HP's Zero Day Initiative Secure Transport Available for: OS X Mountain Lion v10.8.5 Impact: An attacker may be able to decrypt data protected by SSL Description: There were known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite used a block cipher in CBC mode. To address these issues for applications using Secure Transport, the 1-byte fragment mitigation was enabled by default for this configuration. CVE-ID CVE-2011-3389 : Juliano Rizzo and Thai Duong OS X Mavericks v10.9.2 includes the content of Safari 7.0.2. OS X Mavericks v10.9.2 and Security Update 2014-001 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJTDNeoAAoJEPefwLHPlZEwaRAP/3i/2qRvNv6JqmE9p48uEyXn mlxwXpMyop+vrgMmuiSP14EGSv06HO04PNUtaWPxm7tVYXu0tMtjDcYdIu40TAy6 U0T6QhRZC/uag1DCvdEOvqRUajKmmPtHTCJ6OsQGtGJHlEM+S5XgxRr7qgfkHMfb OlqFsgpdL/AAiYNfzItN2C+r2Lfwro6LDlxhikpASojlMFQrk8nJ6irRv617anSZ 3DwJW2iJxNfpVrgqA1Nrx1fkrPmeT/8jgGuEP6RaKiWIbfXjRG5BW9WuarMqmaP8 C6XoTaJaqEO9zb7F2uJR0HIYpJd065y/xiYNm91yDWIjdrO3wVgNVPGo1pHVyYsY Y7lcyHUVJortKF8SHquw0j3Ujeugu8iWp6ND/00/4dGvwb0jzrxPUxkEmJ43130O t2Obtxdsaa+ub8cZHDN93WB3FQR5hd+KaeXLJC55q0qYY8o8zqdPqXAlYAP2gUQX iB4Bs7NAh2CNJWNTtk2soTjZOwPvPLSPZ6I3w5i0HVP7HQl5K8chjihAwSeyezCZ q5gxCiK0lBW88AUd9n3L7ZOW2Rg53mh6+RiUL/VQ7TfidoP417VDKum300pZkgNv kBCklX9ya7QeLjOMnbnsTk32qG+TiDPgiGZ5IrK6C6T26dexJWbm8tuwPjy5r8mI aiYIh+SzR0rBdMZRgyzv =+DAJ -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2014-1252 // JVNDB: JVNDB-2014-001239 // BID: 65113 // VULHUB: VHN-69191 // PACKETSTORM: 125644 // PACKETSTORM: 125427

AFFECTED PRODUCTS

vendor:applemodel:pagesscope:eqversion:2.0.1

Trust: 1.6

vendor:applemodel:pagesscope:eqversion:5.0.1

Trust: 1.6

vendor:applemodel:pagesscope:eqversion:2.0

Trust: 1.6

vendor:applemodel:pagesscope:eqversion:5.0

Trust: 1.6

vendor:applemodel:pagesscope:eqversion:2.0.2

Trust: 1.6

vendor:applemodel:mac os xscope:lteversion:10.9.1

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:7.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.8.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.9

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.9.1

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7.1 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7.1 (iphone 4 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7.1 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:pagesscope:ltversion:(ios 7 for ) version 2.1 earlier

Trust: 0.8

vendor:applemodel:pagesscope:ltversion:(os x for ) version 5.1 earlier

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:7.0

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.9.1

Trust: 0.6

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

sources: BID: 65113 // JVNDB: JVNDB-2014-001239 // CNNVD: CNNVD-201401-513 // NVD: CVE-2014-1252

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1252
value: HIGH

Trust: 1.0

NVD: CVE-2014-1252
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201401-513
value: HIGH

Trust: 0.6

VULHUB: VHN-69191
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-1252
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-69191
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-69191 // JVNDB: JVNDB-2014-001239 // CNNVD: CNNVD-201401-513 // NVD: CVE-2014-1252

PROBLEMTYPE DATA

problemtype:CWE-415

Trust: 1.1

problemtype:CWE-399

Trust: 0.8

sources: VULHUB: VHN-69191 // JVNDB: JVNDB-2014-001239 // NVD: CVE-2014-1252

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201401-513

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201401-513

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001239

PATCH

title:APPLE-SA-2014-02-25-1url:http://lists.apple.com/archives/security-announce/2014/Feb/msg00000.html

Trust: 0.8

title:HT6150url:http://support.apple.com/kb/HT6150

Trust: 0.8

title:HT6162url:http://support.apple.com/kb/HT6162

Trust: 0.8

title:HT6117url:http://support.apple.com/kb/HT6117

Trust: 0.8

title:HT6117url:http://support.apple.com/kb/HT6117?viewlocale=ja_JP

Trust: 0.8

title:HT6150url:http://support.apple.com/kb/HT6150?viewlocale=ja_JP

Trust: 0.8

title:HT6162url:http://support.apple.com/kb/HT6162?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2014-001239

EXTERNAL IDS

db:NVDid:CVE-2014-1252

Trust: 3.0

db:BIDid:65113

Trust: 1.4

db:OSVDBid:102460

Trust: 1.1

db:SECUNIAid:56615

Trust: 1.1

db:SECUNIAid:56630

Trust: 1.1

db:SECTRACKid:1029683

Trust: 1.1

db:JVNid:JVNVU94229445

Trust: 0.8

db:JVNid:JVNVU95868425

Trust: 0.8

db:JVNid:JVNVU90143917

Trust: 0.8

db:JVNDBid:JVNDB-2014-001239

Trust: 0.8

db:CNNVDid:CNNVD-201401-513

Trust: 0.7

db:VULHUBid:VHN-69191

Trust: 0.1

db:PACKETSTORMid:125644

Trust: 0.1

db:PACKETSTORMid:125427

Trust: 0.1

sources: VULHUB: VHN-69191 // BID: 65113 // JVNDB: JVNDB-2014-001239 // PACKETSTORM: 125644 // PACKETSTORM: 125427 // CNNVD: CNNVD-201401-513 // NVD: CVE-2014-1252

REFERENCES

url:http://support.apple.com/kb/ht6117

Trust: 1.7

url:http://www.securityfocus.com/bid/65113

Trust: 1.1

url:http://support.apple.com/kb/ht6150

Trust: 1.1

url:http://support.apple.com/kb/ht6162

Trust: 1.1

url:http://osvdb.org/102460

Trust: 1.1

url:http://www.securitytracker.com/id/1029683

Trust: 1.1

url:http://secunia.com/advisories/56615

Trust: 1.1

url:http://secunia.com/advisories/56630

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/90672

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1252

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90143917/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95868425/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94229445/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1252

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-6629

Trust: 0.2

url:http://support.apple.com/kb/ht1222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1252

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5133

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1269

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1270

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5196

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1267

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1271

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1275

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1274

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1278

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1276

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5198

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1273

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2926

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5227

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6835

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6635

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2909

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5225

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6625

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1272

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5197

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1277

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1255

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5179

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1250

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1245

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1259

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5987

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1254

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1256

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1258

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1249

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6420

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1247

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3389

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5139

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1261

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1896

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1260

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1246

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1862

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1257

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5986

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4113

Trust: 0.1

sources: VULHUB: VHN-69191 // BID: 65113 // JVNDB: JVNDB-2014-001239 // PACKETSTORM: 125644 // PACKETSTORM: 125427 // CNNVD: CNNVD-201401-513 // NVD: CVE-2014-1252

CREDITS

Felix Groebert of the Google Security Team

Trust: 0.3

sources: BID: 65113

SOURCES

db:VULHUBid:VHN-69191
db:BIDid:65113
db:JVNDBid:JVNDB-2014-001239
db:PACKETSTORMid:125644
db:PACKETSTORMid:125427
db:CNNVDid:CNNVD-201401-513
db:NVDid:CVE-2014-1252

LAST UPDATE DATE

2025-04-11T21:08:59.312000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-69191date:2017-08-29T00:00:00
db:BIDid:65113date:2014-03-11T00:33:00
db:JVNDBid:JVNDB-2014-001239date:2014-03-17T00:00:00
db:CNNVDid:CNNVD-201401-513date:2014-01-27T00:00:00
db:NVDid:CVE-2014-1252date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-69191date:2014-01-24T00:00:00
db:BIDid:65113date:2014-01-23T00:00:00
db:JVNDBid:JVNDB-2014-001239date:2014-01-27T00:00:00
db:PACKETSTORMid:125644date:2014-03-11T02:13:44
db:PACKETSTORMid:125427date:2014-02-26T22:21:07
db:CNNVDid:CNNVD-201401-513date:2014-01-27T00:00:00
db:NVDid:CVE-2014-1252date:2014-01-24T15:08:00.933