ID

VAR-201403-0268


CVE

CVE-2014-1290


TITLE

Apple iOS and Apple TV Used in etc. Webkit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2014-001675

DESCRIPTION

WebKit, as used in Apple iOS before 7.1 and Apple TV before 6.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-1289, CVE-2014-1291, CVE-2014-1292, CVE-2014-1293, and CVE-2014-1294. Apple iOS and Apple TV Used in etc. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of isindex elements. The issue lies in setting attributes to invalid values. By manipulating a document's elements an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. WebKit is prone to multiple memory-corruption vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. CVE-ID CVE-2014-1297 : Ian Beer of Google Project Zero For OS X Mavericks and OS X Mountain Lion systems, Safari 7.0.3 and Safari 6.1.3 may be obtained from Mac App Store. For OS X Lion systems Safari 6.1.3 is available via the Apple Software Update application. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-03-10-2 Apple TV 6.1 Apple TV 6.1 is now available and addresses the following: Apple TV Available for: Apple TV 2nd generation and later Impact: An attacker with access to an Apple TV may access sensitive user information from logs Description: Sensitive user information was logged. This issue was addressed by logging less information. CVE-ID CVE-2014-1279 : David Schuetz working at Intrepidus Group Apple TV Available for: Apple TV 2nd generation and later Impact: Profile expiration dates were not honored Description: Expiration dates of mobile configuration profiles were not evaluated correctly. The issue was resolved through improved handling of configuration profiles. CVE-ID CVE-2014-1267 Apple TV Available for: Apple TV 2nd generation and later Impact: A malicious application can cause an unexpected system termination Description: A reachable assertion issue existed in CoreCapture's handling of IOKit API calls. The issue was addressed through additional validation of input from IOKit. CVE-ID CVE-2014-1271 : Filippo Bigarella Apple TV Available for: Apple TV 2nd generation and later Impact: A local user may be able to change permissions on arbitrary files Description: CrashHouseKeeping followed symbolic links while changing permissions on files. This issue was addressed by not following symbolic links when changing permissions on files. CVE-ID CVE-2014-1272 : evad3rs Apple TV Available for: Apple TV 2nd generation and later Impact: Code signing requirements may be bypassed Description: Text relocation instructions in dynamic libraries may be loaded by dyld without code signature validation. This issue was addressed by ignoring text relocation instructions. CVE-ID CVE-2014-1273 : evad3rs Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JPEG2000 images in PDF files. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1275 : Felix Groebert of the Google Security Team Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in libtiff's handling of TIFF images. This issue was addressed through additional validation of TIFF images. CVE-ID CVE-2012-2088 Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted JPEG file may lead to the disclosure of memory contents Description: An uninitialized memory access issue existed in libjpeg's handling of JPEG markers, resulting in the disclosure of memory contents. This issue was addressed through additional validation of JPEG files. CVE-ID CVE-2013-6629 : Michal Zalewski Apple TV Available for: Apple TV 2nd generation and later Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel Description: An out of bounds memory access issue existed in the ARM ptmx_get_ioctl function. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1278 : evad3rs Apple TV Available for: Apple TV 2nd generation and later Impact: A configuration profile may be hidden from the user Description: A configuration profile with a long name could be loaded onto the device but was not displayed in the profile UI. The issue was addressed through improved handling of profile names. CVE-ID CVE-2014-1282 : Assaf Hefetz, Yair Amit and Adi Sharabani of Skycure Apple TV Available for: Apple TV 2nd generation and later Impact: A person with physical access to the device may be able to cause arbitrary code execution in kernel mode Description: A memory corruption issue existed in the handling of USB messages. This issue was addressed through additional validation of USB messages. These issues were addressed through improved memory handling. CVE-ID CVE-2013-2909 : Atte Kettunen of OUSPG CVE-2013-2926 : cloudfuzzer CVE-2013-2928 : Google Chrome Security Team CVE-2013-5196 : Google Chrome Security Team CVE-2013-5197 : Google Chrome Security Team CVE-2013-5198 : Apple CVE-2013-5199 : Apple CVE-2013-5225 : Google Chrome Security Team CVE-2013-5228 : Keen Team (@K33nTeam) working with HP's Zero Day Initiative CVE-2013-6625 : cloudfuzzer CVE-2013-6635 : cloudfuzzer CVE-2014-1269 : Apple CVE-2014-1270 : Apple CVE-2014-1289 : Apple CVE-2014-1290 : ant4g0nist (SegFault) working with HP's Zero Day Initiative, Google Chrome Security Team CVE-2014-1291 : Google Chrome Security Team CVE-2014-1292 : Google Chrome Security Team CVE-2014-1293 : Google Chrome Security Team CVE-2014-1294 : Google Chrome Security Team Apple TV Available for: Apple TV 2nd generation and later Impact: Playing a maliciously crafted video could lead to the device becoming unresponsive Description: A null dereference issue existed in the handling of MPEG-4 encoded files. This issue was addressed through improved memory handling. CVE-ID CVE-2014-1280 : rg0rd Installation note: Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> General -> Update Software". To check the current version of software, select "Settings -> General -> About". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJTGlvfAAoJEPefwLHPlZEw8GEP/ikatTiohUPRvpjubarcXePV z6ixKxmqUUvSy+AlyFTsCpvB1IEipSx5hKbYsxk5+4qAVsYG3VEpLNJKBarUHQN8 K1+I77xF5osLxrypWV6vEDqqFDcZyflumtvfdj7EmWf/FcWnOooRQt7wVVrzrCCh 40nfspy1YjNi1EO2p6dDlzi+yvEGF5CHg8R1zSFf7ozLPoCABlnbdzXxh+nYoI+E y65R4Eo7OBhVH5mJvBczjsHu/GljR3y/yi3NSnoV5ga5SfaaOlwa8emgNooeEs3u ghkfm2UxkjtdNkpVMfwFp35oLESIl6pMd2dtH2sU4MwRK3h8rvFeS/zJRZmwEIXO 5+9tNop1hmF52aVKRZAJ4/A9kbTC3pKd0PxvKsveB6Pgxbq9eDfueMC/r6FtOZDa is95LuLtf26h8xQt8FovY7Cm80ckOT4mJnvzfmpGmUSK4PHsNfJwfJOBa1yMHTJg CDfg+jGhHy7DJuawekzQjcvkz34YWg7Lp25ZJilvZf8dGB2R4g+hikdOrWKI4vFj x7LGZg6IPaHFt0MPgjnoV1FhABnXksD41uIAQP2LhDrHWnRgTeJoGwQ2SuZjSA6w T/DzhicTLq6MDSBjlbt6EJ4gtxWlYDfeAfJcFb/Aret+2L7570q18EkLRbiI8e6k 3NksAqBIKSpadFt+M8wt =xjrI -----END PGP SIGNATURE-----

Trust: 2.79

sources: NVD: CVE-2014-1290 // JVNDB: JVNDB-2014-001675 // ZDI: ZDI-14-057 // BID: 66088 // VULHUB: VHN-69229 // PACKETSTORM: 125981 // PACKETSTORM: 125646

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:7.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0.4

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0.5

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0.3

Trust: 1.6

vendor:applemodel:tvosscope:lteversion:6.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:7.0.6

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.0

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:(windows)

Trust: 0.8

vendor:applemodel:tvscope:eqversion:6.1

Trust: 0.8

vendor:applemodel:tvscope:ltversion:(apple tv first 2 after generation )

Trust: 0.8

vendor:applemodel:iosscope:eqversion:7.1

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(ipad 2 or later )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mavericks v10.9.2)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x lion v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x lion server v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x lion server v10.7.5)

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(iphone 4 or later )

Trust: 0.8

vendor:applemodel:safariscope:eqversion:6.1.3

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x lion v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mavericks v10.9.2)

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:12.0.1

Trust: 0.8

vendor:applemodel:safariscope: - version: -

Trust: 0.7

vendor:applemodel:tvscope:eqversion:6.0.1

Trust: 0.6

vendor:applemodel:tvscope:eqversion:6.0.2

Trust: 0.6

vendor:applemodel:tvscope:eqversion:6.0

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:7.0.6

Trust: 0.6

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.5

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.3

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2

Trust: 0.3

vendor:webkitmodel:open source project webkit r82222scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r77705scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r52833scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r52401scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r51295scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r38566scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r105591scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:2

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2-1

Trust: 0.3

vendor:esignalmodel:esignalscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.2.72

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.1

Trust: 0.3

sources: ZDI: ZDI-14-057 // BID: 66088 // JVNDB: JVNDB-2014-001675 // CNNVD: CNNVD-201403-270 // NVD: CVE-2014-1290

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1290
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-1290
value: MEDIUM

Trust: 0.8

ZDI: CVE-2014-1290
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-201403-270
value: MEDIUM

Trust: 0.6

VULHUB: VHN-69229
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-1290
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

VULHUB: VHN-69229
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-14-057 // VULHUB: VHN-69229 // JVNDB: JVNDB-2014-001675 // CNNVD: CNNVD-201403-270 // NVD: CVE-2014-1290

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-69229 // JVNDB: JVNDB-2014-001675 // NVD: CVE-2014-1290

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201403-270

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201403-270

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001675

PATCH

title:HT6162url:http://support.apple.com/kb/HT6162

Trust: 1.5

title:HT6163url:http://support.apple.com/kb/HT6163

Trust: 0.8

title:HT6181url:http://support.apple.com/kb/HT6181

Trust: 0.8

title:HT6537url:http://support.apple.com/en-eu/HT6537

Trust: 0.8

title:HT6162url:http://support.apple.com/kb/HT6162?viewlocale=ja_JP

Trust: 0.8

title:HT6163url:http://support.apple.com/kb/HT6163?viewlocale=ja_JP

Trust: 0.8

title:HT6181url:http://support.apple.com/kb/HT6181?viewlocale=ja_JP

Trust: 0.8

title:HT6537url:http://support.apple.com/ja-jp/HT6537

Trust: 0.8

sources: ZDI: ZDI-14-057 // JVNDB: JVNDB-2014-001675

EXTERNAL IDS

db:NVDid:CVE-2014-1290

Trust: 3.8

db:JVNid:JVNVU94409290

Trust: 0.8

db:JVNid:JVNVU94229445

Trust: 0.8

db:JVNid:JVNVU90170014

Trust: 0.8

db:JVNid:JVNVU97537282

Trust: 0.8

db:JVNDBid:JVNDB-2014-001675

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2109

Trust: 0.7

db:ZDIid:ZDI-14-057

Trust: 0.7

db:CNNVDid:CNNVD-201403-270

Trust: 0.7

db:BIDid:66088

Trust: 0.3

db:VULHUBid:VHN-69229

Trust: 0.1

db:PACKETSTORMid:128734

Trust: 0.1

db:PACKETSTORMid:125981

Trust: 0.1

db:PACKETSTORMid:125646

Trust: 0.1

sources: ZDI: ZDI-14-057 // VULHUB: VHN-69229 // BID: 66088 // JVNDB: JVNDB-2014-001675 // PACKETSTORM: 128734 // PACKETSTORM: 125981 // PACKETSTORM: 125646 // CNNVD: CNNVD-201403-270 // NVD: CVE-2014-1290

REFERENCES

url:http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html

Trust: 2.5

url:http://support.apple.com/kb/ht6162

Trust: 2.4

url:http://support.apple.com/kb/ht6163

Trust: 1.7

url:https://support.apple.com/kb/ht6537

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1290

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94229445/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90170014/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94409290/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97537282/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1290

Trust: 0.8

url:http://www.apple.com/ios/

Trust: 0.3

url:http://www.apple.com/appletv/features.html

Trust: 0.3

url:http://www.webkit.org/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1291

Trust: 0.3

url:http://support.apple.com/kb/ht1222

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-2928

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-2926

Trust: 0.3

url:https://www.apple.com/support/security/pgp/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1290

Trust: 0.3

url:http://gpgtools.org

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1289

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-6625

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1292

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1269

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1270

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-5228

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-5196

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1300

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1298

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-5198

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1293

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-6635

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1294

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1299

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2909

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-5225

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-5197

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2871

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-5199

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-6663

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1268

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2927

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2875

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1304

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1297

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1312

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1309

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1311

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1313

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1713

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1305

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1301

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1303

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1310

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1302

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1307

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6629

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1267

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1271

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1275

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1278

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1287

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1273

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1279

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1282

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1280

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1272

Trust: 0.1

sources: ZDI: ZDI-14-057 // VULHUB: VHN-69229 // BID: 66088 // JVNDB: JVNDB-2014-001675 // PACKETSTORM: 128734 // PACKETSTORM: 125981 // PACKETSTORM: 125646 // CNNVD: CNNVD-201403-270 // NVD: CVE-2014-1290

CREDITS

ant4g0nist (SegFault)

Trust: 0.7

sources: ZDI: ZDI-14-057

SOURCES

db:ZDIid:ZDI-14-057
db:VULHUBid:VHN-69229
db:BIDid:66088
db:JVNDBid:JVNDB-2014-001675
db:PACKETSTORMid:128734
db:PACKETSTORMid:125981
db:PACKETSTORMid:125646
db:CNNVDid:CNNVD-201403-270
db:NVDid:CVE-2014-1290

LAST UPDATE DATE

2025-04-13T22:53:55.978000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-057date:2014-04-03T00:00:00
db:VULHUBid:VHN-69229date:2019-03-08T00:00:00
db:BIDid:66088date:2015-02-04T00:05:00
db:JVNDBid:JVNDB-2014-001675date:2014-11-20T00:00:00
db:CNNVDid:CNNVD-201403-270date:2019-03-13T00:00:00
db:NVDid:CVE-2014-1290date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:ZDIid:ZDI-14-057date:2014-04-03T00:00:00
db:VULHUBid:VHN-69229date:2014-03-14T00:00:00
db:BIDid:66088date:2014-03-10T00:00:00
db:JVNDBid:JVNDB-2014-001675date:2014-03-17T00:00:00
db:PACKETSTORMid:128734date:2014-10-17T15:14:05
db:PACKETSTORMid:125981date:2014-04-02T11:02:22
db:PACKETSTORMid:125646date:2014-03-11T02:19:09
db:CNNVDid:CNNVD-201403-270date:2014-03-14T00:00:00
db:NVDid:CVE-2014-1290date:2014-03-14T10:55:06.270