ID

VAR-201403-0259


CVE

CVE-2014-1279


TITLE

Apple TV Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2014-001667

DESCRIPTION

Apple TV before 6.1 does not properly restrict logging, which allows local users to obtain sensitive information by reading log data. Apple TV is prone to a local information-disclosure vulnerability. An attacker with physical access can exploit this issue to obtain sensitive information that may lead to further attacks. Versions prior to Apple TV 6.1 are vulnerable. It can watch TV programs online through Apple TV, and may also transfer photos, videos and music from iPad, iPhone, iPod and PC to the TV. play. The vulnerability is caused by the program not properly restricting access to logs. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-03-10-2 Apple TV 6.1 Apple TV 6.1 is now available and addresses the following: Apple TV Available for: Apple TV 2nd generation and later Impact: An attacker with access to an Apple TV may access sensitive user information from logs Description: Sensitive user information was logged. This issue was addressed by logging less information. CVE-ID CVE-2014-1279 : David Schuetz working at Intrepidus Group Apple TV Available for: Apple TV 2nd generation and later Impact: Profile expiration dates were not honored Description: Expiration dates of mobile configuration profiles were not evaluated correctly. The issue was resolved through improved handling of configuration profiles. CVE-ID CVE-2014-1267 Apple TV Available for: Apple TV 2nd generation and later Impact: A malicious application can cause an unexpected system termination Description: A reachable assertion issue existed in CoreCapture's handling of IOKit API calls. The issue was addressed through additional validation of input from IOKit. CVE-ID CVE-2014-1271 : Filippo Bigarella Apple TV Available for: Apple TV 2nd generation and later Impact: A local user may be able to change permissions on arbitrary files Description: CrashHouseKeeping followed symbolic links while changing permissions on files. This issue was addressed by not following symbolic links when changing permissions on files. CVE-ID CVE-2014-1272 : evad3rs Apple TV Available for: Apple TV 2nd generation and later Impact: Code signing requirements may be bypassed Description: Text relocation instructions in dynamic libraries may be loaded by dyld without code signature validation. This issue was addressed by ignoring text relocation instructions. CVE-ID CVE-2014-1273 : evad3rs Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JPEG2000 images in PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1275 : Felix Groebert of the Google Security Team Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in libtiff's handling of TIFF images. This issue was addressed through additional validation of TIFF images. CVE-ID CVE-2012-2088 Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted JPEG file may lead to the disclosure of memory contents Description: An uninitialized memory access issue existed in libjpeg's handling of JPEG markers, resulting in the disclosure of memory contents. This issue was addressed through additional validation of JPEG files. CVE-ID CVE-2013-6629 : Michal Zalewski Apple TV Available for: Apple TV 2nd generation and later Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel Description: An out of bounds memory access issue existed in the ARM ptmx_get_ioctl function. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1278 : evad3rs Apple TV Available for: Apple TV 2nd generation and later Impact: A configuration profile may be hidden from the user Description: A configuration profile with a long name could be loaded onto the device but was not displayed in the profile UI. The issue was addressed through improved handling of profile names. CVE-ID CVE-2014-1282 : Assaf Hefetz, Yair Amit and Adi Sharabani of Skycure Apple TV Available for: Apple TV 2nd generation and later Impact: A person with physical access to the device may be able to cause arbitrary code execution in kernel mode Description: A memory corruption issue existed in the handling of USB messages. This issue was addressed through additional validation of USB messages. CVE-ID CVE-2014-1287 : Andy Davis of NCC Group WebKit Available for: Apple TV 2nd generation and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2013-2909 : Atte Kettunen of OUSPG CVE-2013-2926 : cloudfuzzer CVE-2013-2928 : Google Chrome Security Team CVE-2013-5196 : Google Chrome Security Team CVE-2013-5197 : Google Chrome Security Team CVE-2013-5198 : Apple CVE-2013-5199 : Apple CVE-2013-5225 : Google Chrome Security Team CVE-2013-5228 : Keen Team (@K33nTeam) working with HP's Zero Day Initiative CVE-2013-6625 : cloudfuzzer CVE-2013-6635 : cloudfuzzer CVE-2014-1269 : Apple CVE-2014-1270 : Apple CVE-2014-1289 : Apple CVE-2014-1290 : ant4g0nist (SegFault) working with HP's Zero Day Initiative, Google Chrome Security Team CVE-2014-1291 : Google Chrome Security Team CVE-2014-1292 : Google Chrome Security Team CVE-2014-1293 : Google Chrome Security Team CVE-2014-1294 : Google Chrome Security Team Apple TV Available for: Apple TV 2nd generation and later Impact: Playing a maliciously crafted video could lead to the device becoming unresponsive Description: A null dereference issue existed in the handling of MPEG-4 encoded files. This issue was addressed through improved memory handling. CVE-ID CVE-2014-1280 : rg0rd Installation note: Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> General -> Update Software". To check the current version of software, select "Settings -> General -> About". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJTGlvfAAoJEPefwLHPlZEw8GEP/ikatTiohUPRvpjubarcXePV z6ixKxmqUUvSy+AlyFTsCpvB1IEipSx5hKbYsxk5+4qAVsYG3VEpLNJKBarUHQN8 K1+I77xF5osLxrypWV6vEDqqFDcZyflumtvfdj7EmWf/FcWnOooRQt7wVVrzrCCh 40nfspy1YjNi1EO2p6dDlzi+yvEGF5CHg8R1zSFf7ozLPoCABlnbdzXxh+nYoI+E y65R4Eo7OBhVH5mJvBczjsHu/GljR3y/yi3NSnoV5ga5SfaaOlwa8emgNooeEs3u ghkfm2UxkjtdNkpVMfwFp35oLESIl6pMd2dtH2sU4MwRK3h8rvFeS/zJRZmwEIXO 5+9tNop1hmF52aVKRZAJ4/A9kbTC3pKd0PxvKsveB6Pgxbq9eDfueMC/r6FtOZDa is95LuLtf26h8xQt8FovY7Cm80ckOT4mJnvzfmpGmUSK4PHsNfJwfJOBa1yMHTJg CDfg+jGhHy7DJuawekzQjcvkz34YWg7Lp25ZJilvZf8dGB2R4g+hikdOrWKI4vFj x7LGZg6IPaHFt0MPgjnoV1FhABnXksD41uIAQP2LhDrHWnRgTeJoGwQ2SuZjSA6w T/DzhicTLq6MDSBjlbt6EJ4gtxWlYDfeAfJcFb/Aret+2L7570q18EkLRbiI8e6k 3NksAqBIKSpadFt+M8wt =xjrI -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2014-1279 // JVNDB: JVNDB-2014-001667 // BID: 66090 // VULHUB: VHN-69218 // VULMON: CVE-2014-1279 // PACKETSTORM: 125646

AFFECTED PRODUCTS

vendor:applemodel:tvosscope:lteversion:6.0.2

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.0

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:tvscope:ltversion:6.1 (apple tv first 2 after generation )

Trust: 0.8

vendor:applemodel:tvscope:eqversion:6.0

Trust: 0.6

vendor:applemodel:tvscope:eqversion:6.0.1

Trust: 0.6

vendor:applemodel:tvscope:eqversion:6.0.2

Trust: 0.6

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.1

Trust: 0.3

sources: BID: 66090 // JVNDB: JVNDB-2014-001667 // CNNVD: CNNVD-201403-262 // NVD: CVE-2014-1279

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1279
value: LOW

Trust: 1.0

NVD: CVE-2014-1279
value: LOW

Trust: 0.8

CNNVD: CNNVD-201403-262
value: LOW

Trust: 0.6

VULHUB: VHN-69218
value: LOW

Trust: 0.1

VULMON: CVE-2014-1279
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2014-1279
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-69218
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-69218 // VULMON: CVE-2014-1279 // JVNDB: JVNDB-2014-001667 // CNNVD: CNNVD-201403-262 // NVD: CVE-2014-1279

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-69218 // JVNDB: JVNDB-2014-001667 // NVD: CVE-2014-1279

THREAT TYPE

local

Trust: 0.9

sources: BID: 66090 // CNNVD: CNNVD-201403-262

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201403-262

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001667

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-69218

PATCH

title:HT6163url:http://support.apple.com/kb/HT6163

Trust: 0.8

title:HT6163url:http://support.apple.com/kb/HT6163?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2014-001667

EXTERNAL IDS

db:NVDid:CVE-2014-1279

Trust: 3.0

db:JVNid:JVNVU90170014

Trust: 0.8

db:JVNDBid:JVNDB-2014-001667

Trust: 0.8

db:CNNVDid:CNNVD-201403-262

Trust: 0.7

db:BIDid:66090

Trust: 0.5

db:PACKETSTORMid:125657

Trust: 0.2

db:VULHUBid:VHN-69218

Trust: 0.1

db:VULMONid:CVE-2014-1279

Trust: 0.1

db:PACKETSTORMid:125646

Trust: 0.1

sources: VULHUB: VHN-69218 // VULMON: CVE-2014-1279 // BID: 66090 // JVNDB: JVNDB-2014-001667 // PACKETSTORM: 125646 // CNNVD: CNNVD-201403-262 // NVD: CVE-2014-1279

REFERENCES

url:http://support.apple.com/kb/ht6163

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1279

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90170014/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1279

Trust: 0.8

url:http://www.apple.com/appletv/features.html

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/66090

Trust: 0.1

url:https://packetstormsecurity.com/files/125657/apple-tv-touch-password-disclosure.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1291

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6629

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1269

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1270

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1267

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5196

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1271

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1275

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1278

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5198

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1287

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1273

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2926

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1279

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1290

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6635

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1289

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1282

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1280

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2909

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5225

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6625

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1272

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5197

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5199

Trust: 0.1

sources: VULHUB: VHN-69218 // VULMON: CVE-2014-1279 // BID: 66090 // JVNDB: JVNDB-2014-001667 // PACKETSTORM: 125646 // CNNVD: CNNVD-201403-262 // NVD: CVE-2014-1279

CREDITS

David Schuetz of the Intrepidus Group.

Trust: 0.3

sources: BID: 66090

SOURCES

db:VULHUBid:VHN-69218
db:VULMONid:CVE-2014-1279
db:BIDid:66090
db:JVNDBid:JVNDB-2014-001667
db:PACKETSTORMid:125646
db:CNNVDid:CNNVD-201403-262
db:NVDid:CVE-2014-1279

LAST UPDATE DATE

2025-04-13T20:19:33.067000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-69218date:2019-03-08T00:00:00
db:VULMONid:CVE-2014-1279date:2019-03-08T00:00:00
db:BIDid:66090date:2014-03-12T00:52:00
db:JVNDBid:JVNDB-2014-001667date:2014-03-17T00:00:00
db:CNNVDid:CNNVD-201403-262date:2019-03-13T00:00:00
db:NVDid:CVE-2014-1279date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-69218date:2014-03-14T00:00:00
db:VULMONid:CVE-2014-1279date:2014-03-14T00:00:00
db:BIDid:66090date:2014-03-10T00:00:00
db:JVNDBid:JVNDB-2014-001667date:2014-03-17T00:00:00
db:PACKETSTORMid:125646date:2014-03-11T02:19:09
db:CNNVDid:CNNVD-201403-262date:2014-03-14T00:00:00
db:NVDid:CVE-2014-1279date:2014-03-14T10:55:06.083