ID

VAR-201407-0106


CVE

CVE-2014-1363


TITLE

Apple Used in products WebKit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2014-003049

DESCRIPTION

WebKit, as used in Apple iOS before 7.1.2, Apple Safari before 6.1.5 and 7.x before 7.0.5, and Apple TV before 6.1.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-06-30-1, APPLE-SA-2014-06-30-3, and APPLE-SA-2014-06-30-4. Apple iOS , Apple Safari and Apple TV Used in etc. WebKit is prone to multiple unspecified memory-corruption vulnerabilities. An attacker may exploit these issues by enticing victims into viewing a malicious webpage. Successful exploits may allow attackers to execute arbitrary code in the context of the affected browser or cause denial-of-service conditions; other attacks may also be possible. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-06-30-4 Apple TV 6.1.2 Apple TV 6.1.2 is now available and addresses the following: Apple TV Available for: Apple TV 2nd generation and later Impact: An application could cause the device to unexpectedly restart Description: A null pointer dereference existed in the handling of IOKit API arguments. This issue was addressed through additional validation of IOKit API arguments. CVE-ID CVE-2014-1355 : cunzhang from Adlab of Venustech Apple TV Available for: Apple TV 2nd generation and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A heap buffer overflow existed in launchd's handling of IPC messages. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1356 : Ian Beer of Google Project Zero Apple TV Available for: Apple TV 2nd generation and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A heap buffer overflow existed in launchd's handling of log messages. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1357 : Ian Beer of Google Project Zero Apple TV Available for: Apple TV 2nd generation and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in launchd. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1358 : Ian Beer of Google Project Zero Apple TV Available for: Apple TV 2nd generation and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer underflow existed in launchd. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1359 : Ian Beer of Google Project Zero Apple TV Available for: Apple TV 2nd generation and later Impact: Two bytes of memory could be disclosed to a remote attacker Description: An uninitialized memory access issue existed in the handling of DTLS messages in a TLS connection. This issue was addressed by only accepting DTLS messages in a DTLS connection. These issues were addressed through improved memory handling. CVE-ID CVE-2013-2875 : miaubiz CVE-2013-2927 : cloudfuzzer CVE-2014-1323 : banty CVE-2014-1325 : Apple CVE-2014-1326 : Apple CVE-2014-1327 : Google Chrome Security Team, Apple CVE-2014-1329 : Google Chrome Security Team CVE-2014-1330 : Google Chrome Security Team CVE-2014-1331 : cloudfuzzer CVE-2014-1333 : Google Chrome Security Team CVE-2014-1334 : Apple CVE-2014-1335 : Google Chrome Security Team CVE-2014-1336 : Apple CVE-2014-1337 : Apple CVE-2014-1338 : Google Chrome Security Team CVE-2014-1339 : Atte Kettunen of OUSPG CVE-2014-1341 : Google Chrome Security Team CVE-2014-1342 : Apple CVE-2014-1343 : Google Chrome Security Team CVE-2014-1362 : Apple, miaubiz CVE-2014-1363 : Apple CVE-2014-1364 : Apple CVE-2014-1365 : Apple, Google Chrome Security Team CVE-2014-1366 : Apple CVE-2014-1367 : Apple CVE-2014-1368 : Wushi of Keen Team (Research Team of Keen Cloud Tech) CVE-2014-1382 : Renata Hodovan of University of Szeged / Samsung Electronics CVE-2014-1731 : an anonymous member of the Blink development community Apple TV Available for: Apple TV 2nd generation and later Impact: An iTunes Store transaction may be completed with insufficient authorization Description: A signed-in user was able to complete an iTunes Store transaction without providing a valid password when prompted. This issue was addressed by additional enforcement of purchase authorization. CVE-ID CVE-2014-1383 Installation note: Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> General -> Update Software". To check the current version of software, select "Settings -> General -> About". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJTsaLGAAoJEBcWfLTuOo7tgDkQAISO0VZeghUvKSWSJfPC7mlW g8jGo58zwkZmjNcd0V907jHlK2UdNtHrV9SSvhvrYWhfVezoVrvg1EMciDMtdlxp KHvAiCmiHJbs2NL3qrJSxjBZQfsovs1k0ju1MLAtiPjnNjzRLra01ww+IKjMK3j6 FldfDXFT5Fhag2qcyH4NuI/BNb2rKSxHp7F2A64e3aKR00DKmyOGXpF9fIZes37P OqYWYRKfJ+sXMI8AOP/V++SuZ0SiUhSRKX8nSF0bNu1qpG9TvsBcZOjDigN0JMZg 8aD7be8KBs9vjSuRAG96q0fkf1ePN4MUIpe+uTHE2LJbOphvoKwYoSthfFc8KQ18 x9dVbHNd9Kfhqg5Gf10yr+a6pyxFMjTWEjs3UtDGQw8ZLUdggHtyqZHLVsszNgmA m+LK6sQSWn11uiCu8R0dYwcd0MKwZUM+WrGauO/V7GrhnnbTmI1fRKT6VV583obh e3zFt2zvvIPcC7SCtRp1hMSAqtVEWWUFS++6sfpnWTYfXaN6XZmg3dIjDUp5hKa7 +ilRNeewFKOH/kXm+UWcIwzw3SMSAIsfOKkoDvf0/N7/0MfEyDN3wt5E2mXb3M2B Co5elfxqaJGMwZPBxpdWzUmNHrvVnFwWXn2Bsuo+lah6S/GLRajKnLxiJBJwXZWq HesVEEK6hJjPBlUEY9a5 =b7jD -----END PGP SIGNATURE----- . CVE-ID CVE-2014-1369 : Aaron Sigel of vtty.com WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.3 Impact: A maliciously crafted website may be able to spoof its domain name in the address bar Description: A spoofing issue existed in the handling of URLs. CVE-ID CVE-2014-1345 : Erling Ellingsen of Facebook For OS X Mavericks and OS X Mountain Lion systems, Safari 7.0.5 and Safari 6.1.5 may be obtained from Mac App Store. For OS X Lion systems Safari 6.1.5 is available via the Apple Software Update application

Trust: 2.16

sources: NVD: CVE-2014-1363 // JVNDB: JVNDB-2014-003049 // BID: 68271 // VULHUB: VHN-69302 // PACKETSTORM: 127308 // PACKETSTORM: 127305

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:6.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.1.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.1.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.5

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.1.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:7.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.6

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:tvosscope:lteversion:6.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:safariscope:lteversion:6.1.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.5

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:6.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:(windows)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mavericks v10.9.3)

Trust: 0.8

vendor:applemodel:iosscope:eqversion:7.1.2

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(ipad 2 or later )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x lion v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:safariscope:eqversion:6.1.5

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mavericks v10.9.3)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x lion server v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x lion server v10.7.5)

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(iphone 4 or later )

Trust: 0.8

vendor:applemodel:safariscope:eqversion:7.0.5

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x lion v10.7.5)

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:12.0.1

Trust: 0.8

vendor:applemodel:tvscope:eqversion:6.0.1

Trust: 0.6

vendor:applemodel:tvscope:eqversion:6.0.2

Trust: 0.6

vendor:applemodel:tvscope:eqversion:6.0

Trust: 0.6

vendor:applemodel:tvscope:eqversion:6.1.1

Trust: 0.6

vendor:applemodel:tvscope:eqversion:6.1

Trust: 0.6

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.5

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.3

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:2

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2-1

Trust: 0.3

vendor:esignalmodel:esignalscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.2.72

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.1

Trust: 0.3

sources: BID: 68271 // JVNDB: JVNDB-2014-003049 // CNNVD: CNNVD-201407-044 // NVD: CVE-2014-1363

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1363
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-1363
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201407-044
value: MEDIUM

Trust: 0.6

VULHUB: VHN-69302
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-1363
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-69302
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-69302 // JVNDB: JVNDB-2014-003049 // CNNVD: CNNVD-201407-044 // NVD: CVE-2014-1363

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-69302 // JVNDB: JVNDB-2014-003049 // NVD: CVE-2014-1363

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201407-044

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201407-044

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-003049

PATCH

title:HT6297url:http://support.apple.com/kb/HT6297

Trust: 0.8

title:HT6298url:http://support.apple.com/kb/HT6298

Trust: 0.8

title:HT6537url:http://support.apple.com/en-eu/HT6537

Trust: 0.8

title:HT6293url:http://support.apple.com/kb/HT6293

Trust: 0.8

title:HT6293url:http://support.apple.com/kb/HT6293?viewlocale=ja_JP

Trust: 0.8

title:HT6297url:http://support.apple.com/kb/HT6297?viewlocale=ja_JP

Trust: 0.8

title:HT6298url:http://support.apple.com/kb/HT6298?viewlocale=ja_JP

Trust: 0.8

title:HT6537url:http://support.apple.com/ja-jp/HT6537

Trust: 0.8

title:iPod4,1_6.1.5_10B400_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=50809

Trust: 0.6

title:iPhone6,1_7.1.2_11D257_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=50808

Trust: 0.6

title:iPhone6,2_7.1.2_11D257_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=50807

Trust: 0.6

title:OSXUpd10.9.4url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=50806

Trust: 0.6

title:iPhone6,2_7.0.5_11B601_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=50810

Trust: 0.6

sources: JVNDB: JVNDB-2014-003049 // CNNVD: CNNVD-201407-044

EXTERNAL IDS

db:NVDid:CVE-2014-1363

Trust: 3.0

db:SECTRACKid:1030495

Trust: 1.7

db:SECUNIAid:59481

Trust: 1.7

db:JVNid:JVNVU99696049

Trust: 0.8

db:JVNid:JVNVU97537282

Trust: 0.8

db:JVNDBid:JVNDB-2014-003049

Trust: 0.8

db:CNNVDid:CNNVD-201407-044

Trust: 0.7

db:BIDid:68271

Trust: 0.3

db:VULHUBid:VHN-69302

Trust: 0.1

db:PACKETSTORMid:127308

Trust: 0.1

db:PACKETSTORMid:127305

Trust: 0.1

sources: VULHUB: VHN-69302 // BID: 68271 // JVNDB: JVNDB-2014-003049 // PACKETSTORM: 127308 // PACKETSTORM: 127305 // CNNVD: CNNVD-201407-044 // NVD: CVE-2014-1363

REFERENCES

url:http://archives.neohapsis.com/archives/bugtraq/2014-06/0171.html

Trust: 2.5

url:http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html

Trust: 2.5

url:http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html

Trust: 2.5

url:https://support.apple.com/kb/ht6537

Trust: 1.7

url:http://www.securitytracker.com/id/1030495

Trust: 1.7

url:http://secunia.com/advisories/59481

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1363

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99696049/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97537282/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1363

Trust: 0.8

url:http://www.apple.com/ios/

Trust: 0.3

url:http://www.apple.com/safari/

Trust: 0.3

url:http://www.apple.com/appletv/features.html

Trust: 0.3

url:http://www.webkit.org/

Trust: 0.3

url:http://support.apple.com/kb/ht1222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1363

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1325

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1364

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:http://gpgtools.org

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1362

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1334

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1337

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1336

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1326

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1343

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1331

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1338

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1357

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1335

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1323

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2927

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1342

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1356

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1355

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1358

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1333

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1359

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1327

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2875

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1329

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1341

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1330

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1365

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1340

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1367

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1382

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1366

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1368

Trust: 0.1

sources: VULHUB: VHN-69302 // BID: 68271 // JVNDB: JVNDB-2014-003049 // PACKETSTORM: 127308 // PACKETSTORM: 127305 // CNNVD: CNNVD-201407-044 // NVD: CVE-2014-1363

CREDITS

Apple, miaubiz, Google Chrome Security Team, Wushi of Keen Team (Research Team of Keen Cloud Tech), and Renata Hodovan of University of Szeged / Samsung Electronics

Trust: 0.3

sources: BID: 68271

SOURCES

db:VULHUBid:VHN-69302
db:BIDid:68271
db:JVNDBid:JVNDB-2014-003049
db:PACKETSTORMid:127308
db:PACKETSTORMid:127305
db:CNNVDid:CNNVD-201407-044
db:NVDid:CVE-2014-1363

LAST UPDATE DATE

2025-04-13T22:08:11.391000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-69302date:2019-03-08T00:00:00
db:BIDid:68271date:2014-10-17T19:03:00
db:JVNDBid:JVNDB-2014-003049date:2014-11-20T00:00:00
db:CNNVDid:CNNVD-201407-044date:2019-03-13T00:00:00
db:NVDid:CVE-2014-1363date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-69302date:2014-07-01T00:00:00
db:BIDid:68271date:2014-06-30T00:00:00
db:JVNDBid:JVNDB-2014-003049date:2014-07-02T00:00:00
db:PACKETSTORMid:127308date:2014-07-01T01:07:19
db:PACKETSTORMid:127305date:2014-07-01T01:01:19
db:CNNVDid:CNNVD-201407-044date:2014-07-03T00:00:00
db:NVDid:CVE-2014-1363date:2014-07-01T10:17:26.830