ID

VAR-201404-0215


CVE

CVE-2014-1295


TITLE

plural Apple Product Secure Transport Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2014-002203

DESCRIPTION

Secure Transport in Apple iOS before 7.1.1, Apple OS X 10.8.x and 10.9.x through 10.9.2, and Apple TV before 6.1.1 does not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a "triple handshake attack.". Multiple Apple products are prone to a security-bypass vulnerability. An attacker can exploit this issue to perform man-in-the-middle attacks or impersonate server certificate, which will aid in further attacks. Apple iOS, Apple TV and Apple OS X are all products of Apple Inc. in the United States. Apple iOS is an operating system developed for mobile devices; Apple TV is a high-definition TV set-top box product; Apple OS X is a dedicated operating system developed for Mac computers. An attacker in a privileged network position can intercept data or alter the operations performed within the SSL-protected segment. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-04-22-1 Security Update 2014-002 Security Update 2014-002 is now available and addresses the following: CFNetwork HTTPProtocol Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 Impact: An attacker in a privileged network position can obtain web site credentials Description: Set-Cookie HTTP headers would be processed even if the connection closed before the header line was complete. An attacker could strip security settings from the cookie by forcing the connection to close before the security settings were sent, and then obtain the value of the unprotected cookie. This issue was addressed by ignoring incomplete HTTP header lines. CVE-ID CVE-2014-1296 : Antoine Delignat-Lavaud of Prosecco at Inria Paris CoreServicesUIAgent Available for: OS X Mavericks v10.9.2 Impact: Visiting a maliciously crafted website or URL may result in an unexpected application termination or arbitrary code execution Description: A format string issue existed in the handling of URLs. This issue was addressed through additional validation of URLs. This issue does not affect systems prior to OS X Mavericks. CVE-ID CVE-2014-1315 : Lukasz Pilorz of runic.pl, Erik Kooistra FontParser Available for: OS X Mountain Lion v10.8.5 Impact: Opening a maliciously crafted PDF file may result in an unexpected application termination or arbitrary code execution Description: A buffer underflow existed in the handling of fonts in PDF files. This issue was addressed through additional bounds checking. This issue does not affect OS X Mavericks systems. CVE-ID CVE-2013-5170 : Will Dormann of CERT/CC Heimdal Kerberos Available for: OS X Mavericks v10.9.2 Impact: A remote attacker may be able to cause a denial of service Description: A reachable abort existed in the handling of ASN.1 data. This issue was addressed through additional validation of ASN.1 data. CVE-ID CVE-2014-1316 : Joonas Kuorilehto of Codenomicon ImageIO Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 Impact: Viewing a maliciously crafted JPEG image may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow issue existed in ImageIO's handling of JPEG images. This issue was addressed through improved bounds checking. This issue does not affect systems prior to OS X Mavericks. CVE-ID CVE-2014-1319 : Cristian Draghici of Modulo Consulting, Karl Smith of NCC Group Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 Impact: A malicious application can take control of the system Description: A validation issue existed in the handling of a pointer from userspace. This issue was addressed through additional validation of pointers. CVE-ID CVE-2014-1318 : Ian Beer of Google Project Zero working with HP's Zero Day Initiative IOKit Kernel Available for: OS X Mavericks v10.9.2 Impact: A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization Description: A set of kernel pointers stored in an IOKit object could be retrieved from userland. This issue was addressed through removing the pointers from the object. CVE-ID CVE-2014-1320 : Ian Beer of Google Project Zero working with HP's Zero Day Initiative Kernel Available for: OS X Mavericks v10.9.2 Impact: A local user can read a kernel pointer, which can be used to bypass kernel address space layout randomization Description: A kernel pointer stored in a XNU object could be retrieved from userland. This issue was addressed through removing the pointer from the object. CVE-ID CVE-2014-1322 : Ian Beer of Google Project Zero Power Management Available for: OS X Mavericks v10.9.2 Impact: The screen might not lock Description: If a key was pressed or the trackpad touched just after the lid was closed, the system might have tried to wake up while going to sleep, which would have caused the screen to be unlocked. This issue was addressed by ignoring keypresses while going to sleep. This issue does not affect systems prior to OS X Mavericks. CVE-ID CVE-2014-1321 : Paul Kleeberg of Stratis Health Bloomington MN, Julian Sincu at the Baden-Wuerttemberg Cooperative State University (DHBW Stuttgart), Gerben Wierda of R&A, Daniel Luz Ruby Available for: OS X Mavericks v10.9.2 Impact: Running a Ruby script that handles untrusted YAML tags may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow issue existed in LibYAML's handling of YAML tags. This issue was addressed through additional validation of YAML tags. This issue does not affect systems prior to OS X Mavericks. CVE-ID CVE-2013-6393 Ruby Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 Impact: Running a Ruby script that uses untrusted input to create a Float object may lead to an unexpected application termination or arbitrary code execution Description: A heap-based buffer overflow issue existed in Ruby when converting a string to a floating point value. This issue was addressed through additional validation of floating point values. To prevent attacks based on this scenario, Secure Transport was changed so that, by default, a renegotiation must present the same server certificate as was presented in the original connection. This issue does not affect Mac OS X 10.7 systems and earlier. CVE-ID CVE-2014-1295 : Antoine Delignat-Lavaud, Karthikeyan Bhargavan and Alfredo Pironti of Prosecco at Inria Paris WindowServer Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.2 Impact: Maliciously crafted applications can execute arbitrary code outside the sandbox Description: WindowServer sessions could be created by sandboxed applications. This issue was addressed by disallowing sandboxed applications from creating WindowServer sessions. CVE-ID CVE-2014-1314 : KeenTeam working with HP's Zero Day Initiative Note: Security Update 2014-002 for OS X Mavericks systems includes the security content of Safari 7.0.3: http://support.apple.com/kb/HT6181 Security Update 2014-002 may be obtained via the Apple Software Update application, and from the Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJTVqgEAAoJEPefwLHPlZEw0L8P/RIqgQPc1/RnmPBCKVnZ0QyI 8V9jV07LyXTPySL3at/sAFac148ZYqu9cSKtRWB1oAQCnC8C20EIDLBvsysmKT/a zqLUP8ZGcd4jC4UYUleVgl4U9SXkp0L/HwpASXeRHGeUd/tN4eCBEgDfKSMdm8/s 4S70gTQPRRsQR3D8RkcOITJVFCaDFy/em3AbEJyAm7yDsDOinJdRrirRe7W1Q/p6 KBOmQYb73m0ykg08jgCjohxhTE9gpNeMeR7smN+7GsRb6XFlUOJGtnlePyLm1hN3 85e0KRnQyhTGXJ7y6MTmKzzwJ6/iVZvEeXK1IFwXEkwLLmp5uhp7wfT3DkZZSnBm +uo5g2aSQ80+7ZR9psUQwXOn8/6cFyKbG5tHxkh8IY6qLacvHP5yBcw3gqlUNPg5 2vCNWqhL8fEqncx7K1QC8CxwLQMVw9QnolukdjOxT66+kI0F/mDGeGdf/mYkGBJF ZECjWZsoekGq4TMu75MPn8BlwFpaLnObPi9pC+56BDhEz7f39bqBvkAaW61cQgj4 lRwlEHWNBFlO9XVkQwdmYrZoaeAAVxGG+iPt225dmXXZtWGMs5nYIzPj8GzRoNWQ gYAGZAOBr6pGJCQmfJIy4tLKj0H9za9pxX9RqavKrZyEtTcxpUmrh91mGZiI4eo0 7hmpILk22+6xv6pWCw8D =WWPv -----END PGP SIGNATURE----- . Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "7.1.1"

Trust: 2.25

sources: NVD: CVE-2014-1295 // JVNDB: JVNDB-2014-002203 // BID: 67025 // VULHUB: VHN-69234 // PACKETSTORM: 126271 // PACKETSTORM: 126269 // PACKETSTORM: 126270

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.9.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0.5

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0.4

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.9.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0.6

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.9

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0.3

Trust: 1.6

vendor:applemodel:tvosscope:lteversion:6.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.2

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.0

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:7.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.4

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.8.0

Trust: 1.0

vendor:applemodel:tvscope:eqversion:6.0

Trust: 0.9

vendor:applemodel:tvscope:eqversion:6.0.1

Trust: 0.9

vendor:applemodel:mac os xscope:eqversion:v10.8.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.9.2

Trust: 0.8

vendor:applemodel:tvscope:ltversion:6.1.1 (apple tv first 2 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7.1.1 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7.1.1 (iphone 4 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7.1.1 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:7.1

Trust: 0.6

vendor:applemodel:tvscope:eqversion:4.2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:ipad2scope:eqversion: -

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:30

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.3.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:tvscope:neversion:6.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.2.0

Trust: 0.3

vendor:applemodel:iosscope:neversion:7.1.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.1.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.6

Trust: 0.3

vendor:applemodel:tvscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.5

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.3.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:50

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3.0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:40

Trust: 0.3

vendor:applemodel:tvscope:eqversion:3.0.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.4.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:os mavericksscope:eqversion:x10.9.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iphone 4sscope:eqversion: -

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.6

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.1

Trust: 0.3

sources: BID: 67025 // JVNDB: JVNDB-2014-002203 // CNNVD: CNNVD-201404-463 // NVD: CVE-2014-1295

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1295
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-1295
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201404-463
value: MEDIUM

Trust: 0.6

VULHUB: VHN-69234
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-1295
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-69234
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-69234 // JVNDB: JVNDB-2014-002203 // CNNVD: CNNVD-201404-463 // NVD: CVE-2014-1295

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-69234 // JVNDB: JVNDB-2014-002203 // NVD: CVE-2014-1295

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201404-463

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201404-463

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002203

PATCH

title:HT6208url:http://support.apple.com/kb/HT6208

Trust: 0.8

title:HT6209url:http://support.apple.com/kb/HT6209

Trust: 0.8

title:HT6207url:http://support.apple.com/kb/HT6207

Trust: 0.8

title:HT6207url:http://support.apple.com/kb/HT6207?viewlocale=ja_JP

Trust: 0.8

title:HT6208url:http://support.apple.com/kb/HT6208?viewlocale=ja_JP

Trust: 0.8

title:HT6209url:http://support.apple.com/kb/HT6209?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2014-002203

EXTERNAL IDS

db:NVDid:CVE-2014-1295

Trust: 3.1

db:JVNid:JVNVU95860341

Trust: 0.8

db:JVNDBid:JVNDB-2014-002203

Trust: 0.8

db:CNNVDid:CNNVD-201404-463

Trust: 0.7

db:BIDid:67025

Trust: 0.4

db:VULHUBid:VHN-69234

Trust: 0.1

db:PACKETSTORMid:126271

Trust: 0.1

db:PACKETSTORMid:126269

Trust: 0.1

db:PACKETSTORMid:126270

Trust: 0.1

sources: VULHUB: VHN-69234 // BID: 67025 // JVNDB: JVNDB-2014-002203 // PACKETSTORM: 126271 // PACKETSTORM: 126269 // PACKETSTORM: 126270 // CNNVD: CNNVD-201404-463 // NVD: CVE-2014-1295

REFERENCES

url:http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html

Trust: 2.5

url:http://archives.neohapsis.com/archives/bugtraq/2014-04/0136.html

Trust: 2.5

url:http://archives.neohapsis.com/archives/bugtraq/2014-04/0135.html

Trust: 2.5

url:https://secure-resumption.com/

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1295

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95860341/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1295

Trust: 0.8

url:http://www.apple.com/ios/

Trust: 0.3

url:http://support.apple.com/kb/ht1222

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1296

Trust: 0.3

url:https://www.apple.com/support/security/pgp/

Trust: 0.3

url:http://gpgtools.org

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1320

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1295

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1304

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1312

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1309

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1308

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1300

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1311

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1313

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1298

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1713

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1305

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1303

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1299

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1310

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1302

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-2871

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1307

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-5170

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1315

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6393

Trust: 0.1

url:http://support.apple.com/kb/ht6181

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1314

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1316

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1319

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1322

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1318

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1321

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4164

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

sources: VULHUB: VHN-69234 // BID: 67025 // JVNDB: JVNDB-2014-002203 // PACKETSTORM: 126271 // PACKETSTORM: 126269 // PACKETSTORM: 126270 // CNNVD: CNNVD-201404-463 // NVD: CVE-2014-1295

CREDITS

Antoine Delignat-Lavaud, Karthikeyan Bhargavan and Alfredo Pironti of Prosecco at Inria Paris

Trust: 0.3

sources: BID: 67025

SOURCES

db:VULHUBid:VHN-69234
db:BIDid:67025
db:JVNDBid:JVNDB-2014-002203
db:PACKETSTORMid:126271
db:PACKETSTORMid:126269
db:PACKETSTORMid:126270
db:CNNVDid:CNNVD-201404-463
db:NVDid:CVE-2014-1295

LAST UPDATE DATE

2025-04-13T20:03:48.279000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-69234date:2019-03-08T00:00:00
db:BIDid:67025date:2014-04-22T00:00:00
db:JVNDBid:JVNDB-2014-002203date:2014-04-24T00:00:00
db:CNNVDid:CNNVD-201404-463date:2019-03-13T00:00:00
db:NVDid:CVE-2014-1295date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-69234date:2014-04-23T00:00:00
db:BIDid:67025date:2014-04-22T00:00:00
db:JVNDBid:JVNDB-2014-002203date:2014-04-24T00:00:00
db:PACKETSTORMid:126271date:2014-04-23T00:10:03
db:PACKETSTORMid:126269date:2014-04-23T00:00:30
db:PACKETSTORMid:126270date:2014-04-23T00:06:50
db:CNNVDid:CNNVD-201404-463date:2014-04-24T00:00:00
db:NVDid:CVE-2014-1295date:2014-04-23T11:52:59.383