ID

VAR-201408-0302


CVE

CVE-2014-1390


TITLE

Apple Safari Used in etc. WebKit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2014-003807

DESCRIPTION

WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367. Apple Safari Used in etc. WebKit is prone to multiple unspecified memory-corruption vulnerabilities. An attacker may exploit these issues by enticing victims into viewing a malicious webpage. Successful exploits may allow attackers to execute arbitrary code in the context of the affected browser or cause denial-of-service conditions; other attacks may also be possible. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. A security vulnerability exists in the WebKit used in Apple Safari versions 6.1.5 and prior and 7.x prior to 7.0.6. Background ========== WebKitGTK+ is a full-featured port of the WebKit rendering engine. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-libs/webkit-gtk < 2.4.9 >= 2.4.9 Description =========== Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All WebKitGTK+ 3 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.4.9:3" All WebKitGTK+ 2 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=net-libs/webkit-gtk-2.4.9-r200:2" References ========== [ 1 ] CVE-2014-1344 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1344 [ 2 ] CVE-2014-1384 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1384 [ 3 ] CVE-2014-1385 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1385 [ 4 ] CVE-2014-1386 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1386 [ 5 ] CVE-2014-1387 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1387 [ 6 ] CVE-2014-1388 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1388 [ 7 ] CVE-2014-1389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1389 [ 8 ] CVE-2014-1390 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1390 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201601-02 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-08-13-1 Safari 6.1.6 and Safari 7.0.6 Safari 6.1.6 and Safari 7.0.6 are now available and address the following: WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.4 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2014-1384 : Apple CVE-2014-1385 : Apple CVE-2014-1386 : an anonymous researcher CVE-2014-1387 : Google Chrome Security Team CVE-2014-1388 : Apple CVE-2014-1389 : Apple CVE-2014-1390 : Apple For OS X Mavericks and OS X Mountain Lion systems, Safari 7.0.6 and Safari 6.1.6 may be obtained from Mac App Store. For OS X Lion systems Safari 6.1.6 is available via the Apple Software Update application. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJT67f/AAoJEBcWfLTuOo7th1QP/RNK3hYzgvKM4nUGi0f/dKFv CnMSh8ysRUBca184nmsVC+GNhSiYUsoY17yzOjNTqTahIumb//B77UDduVKmZ7Sh xY/jwCS8hW26Rwq12Hl3xxILLr8wdfv92lg4A6Q6kBOHaMrYkL73KPYb05K6Savb +sRnUQ2lGnsOYYOABQ9LBGDY2g5IKzFjG0z/cd5RqyPsynFDXX4a2fLIdP5CnhUB uffe6n6qkx4VN5px1a8W0EBfkZYXRDGP5G9Uafu85PKpCRQwIhMapw78Dn1Bm5pZ j1T3353JqoRq3C9HeSA9QIxTQiohxKx96s+kwZ4NcjOEBZ4eKqUmrrOSGG1SY2kT aB2xwg02QkyJ2JF/EHWB4hYKn3G6ibVMhdcGQn35yBWdLTHTjt2ey9GFyAks2+Qw pD9laSh1OyV9bye9xyDuxEM3czMTmLifxRSS6yovwCWBOGc4MgqVEU4T0nOAIXpC wPI+cWSSOJbodeSuPtSsPOTX7bvvCLTs+m+TVbw5kiyLxFykU2Rq2bxGzc50mye3 /iZydodYPyxyAjFCwD+iwz51vk+GQsrv9t8OEanZRtU9rs/Q65j44W7aLARiw+Zu UzqUTn2wEOS4P0iMIoRfG7kiOnp4IbsMWEEq0BzJe12Be5byljblVvN2x289w0If BOXU+79WS0At0joNkHnb =cfmv -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2014-1390 // JVNDB: JVNDB-2014-003807 // BID: 69223 // VULHUB: VHN-69329 // PACKETSTORM: 135409 // PACKETSTORM: 127877

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:6.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.1.4

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.5

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.1.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:6.1.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:safariscope:lteversion:6.1.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.1.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:(windows)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:7.0.6

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mavericks v10.9.4)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x lion v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:6.1.6

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mavericks v10.9.4)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x lion server v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x lion server v10.7.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x lion v10.7.5)

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:12.0.1

Trust: 0.8

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:esignalmodel:esignalscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.2.72

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

sources: BID: 69223 // JVNDB: JVNDB-2014-003807 // CNNVD: CNNVD-201408-246 // NVD: CVE-2014-1390

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1390
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-1390
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201408-246
value: MEDIUM

Trust: 0.6

VULHUB: VHN-69329
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-1390
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-69329
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-69329 // JVNDB: JVNDB-2014-003807 // CNNVD: CNNVD-201408-246 // NVD: CVE-2014-1390

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-69329 // JVNDB: JVNDB-2014-003807 // NVD: CVE-2014-1390

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 135409 // CNNVD: CNNVD-201408-246

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201408-246

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-003807

PATCH

title:HT6537url:http://support.apple.com/en-eu/HT6537

Trust: 0.8

title:HT6367url:http://support.apple.com/kb/HT6367

Trust: 0.8

title:HT6367url:http://support.apple.com/kb/HT6367?viewlocale=ja_JP

Trust: 0.8

title:HT6537url:http://support.apple.com/ja-jp/HT6537

Trust: 0.8

title:Safari7.0.6Mavericksurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51716

Trust: 0.6

title:Safari6.1.6Lionurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51715

Trust: 0.6

sources: JVNDB: JVNDB-2014-003807 // CNNVD: CNNVD-201408-246

EXTERNAL IDS

db:NVDid:CVE-2014-1390

Trust: 3.0

db:SECUNIAid:60705

Trust: 1.7

db:BIDid:69223

Trust: 1.4

db:SECTRACKid:1030731

Trust: 1.1

db:JVNid:JVNVU93577368

Trust: 0.8

db:JVNid:JVNVU97537282

Trust: 0.8

db:JVNDBid:JVNDB-2014-003807

Trust: 0.8

db:CNNVDid:CNNVD-201408-246

Trust: 0.7

db:VULHUBid:VHN-69329

Trust: 0.1

db:PACKETSTORMid:135409

Trust: 0.1

db:PACKETSTORMid:127877

Trust: 0.1

sources: VULHUB: VHN-69329 // BID: 69223 // JVNDB: JVNDB-2014-003807 // PACKETSTORM: 135409 // PACKETSTORM: 127877 // CNNVD: CNNVD-201408-246 // NVD: CVE-2014-1390

REFERENCES

url:http://support.apple.com/kb/ht6367

Trust: 2.0

url:http://secunia.com/advisories/60705

Trust: 1.7

url:https://support.apple.com/kb/ht6537

Trust: 1.4

url:https://security.gentoo.org/glsa/201601-02

Trust: 1.2

url:http://www.securityfocus.com/bid/69223

Trust: 1.1

url:http://www.securitytracker.com/id/1030731

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/95273

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1390

Trust: 0.8

url:http://jvn.jp/vu/jvnvu93577368/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97537282/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1390

Trust: 0.8

url:http://www.securityfocus.com/archive/1/533130

Trust: 0.8

url:http://www.apple.com/safari/

Trust: 0.3

url:http://www.webkit.org/

Trust: 0.3

url:http://webkitgtk.org/security/wsa-2015-0001.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-1388

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1387

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1389

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1386

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1385

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1390

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-1384

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1384

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1389

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1385

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1344

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1388

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1390

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1386

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1344

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1387

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

sources: VULHUB: VHN-69329 // BID: 69223 // JVNDB: JVNDB-2014-003807 // PACKETSTORM: 135409 // PACKETSTORM: 127877 // CNNVD: CNNVD-201408-246 // NVD: CVE-2014-1390

CREDITS

Apple, an anonymous researcher, and Google Chrome Security Team

Trust: 0.3

sources: BID: 69223

SOURCES

db:VULHUBid:VHN-69329
db:BIDid:69223
db:JVNDBid:JVNDB-2014-003807
db:PACKETSTORMid:135409
db:PACKETSTORMid:127877
db:CNNVDid:CNNVD-201408-246
db:NVDid:CVE-2014-1390

LAST UPDATE DATE

2025-04-13T20:27:05.706000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-69329date:2017-08-29T00:00:00
db:BIDid:69223date:2016-02-11T07:46:00
db:JVNDBid:JVNDB-2014-003807date:2014-11-20T00:00:00
db:CNNVDid:CNNVD-201408-246date:2014-08-15T00:00:00
db:NVDid:CVE-2014-1390date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-69329date:2014-08-14T00:00:00
db:BIDid:69223date:2014-08-13T00:00:00
db:JVNDBid:JVNDB-2014-003807date:2014-08-15T00:00:00
db:PACKETSTORMid:135409date:2016-01-27T17:28:13
db:PACKETSTORMid:127877date:2014-08-14T22:51:44
db:CNNVDid:CNNVD-201408-246date:2014-08-15T00:00:00
db:NVDid:CVE-2014-1390date:2014-08-14T11:15:22.877