ID

VAR-201410-1084


CVE

CVE-2014-4450


TITLE

Apple iOS Keyboard subsystem QuickType Vulnerability of obtaining authentication information in a function

Trust: 0.8

sources: JVNDB: JVNDB-2014-004903

DESCRIPTION

The QuickType feature in the Keyboards subsystem in Apple iOS before 8.1 collects typing-prediction data from fields with an off autocomplete attribute, which makes it easier for attackers to discover credentials by reading credential values within unintended DOM input elements. Apple iOS is prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain sensitive information that may lead to further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-10-20-1 iOS 8.1 iOS 8.1 is now available and addresses the following: Bluetooth Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious Bluetooth input device may bypass pairing Description: Unencrypted connections were permitted from Human Interface Device-class Bluetooth Low Energy accessories. If an iOS device had paired with such an accessory, an attacker could spoof the legitimate accessory to establish a connection. The issue was addressed by denying unencrypted HID connections. CVE-ID CVE-2014-4428 : Mike Ryan of iSEC Partners House Arrest Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Files transferred to the device may be written with insufficient cryptographic protection Description: Files could be transferred to an app's Documents directory and encrypted with a key protected only by the hardware UID. This issue was addressed by encrypting the transferred files with a key protected by the hardware UID and the user's passcode. CVE-ID CVE-2014-4448 : Jonathan Zdziarski and Kevin DeLong iCloud Data Access Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker in a privileged network position may force iCloud data access clients to leak sensitive information Description: A TLS certificate validation vulnerability existed in iCloud data access clients. This issue was addressed by improved certificate validation. CVE-ID CVE-2014-4449 : Carl Mehner of USAA Keyboards Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: QuickType could learn users' credentials Description: QuickType could learn users' credentials when switching between elements. This issue was addressed by QuickType not learning from fields where autocomplete is disabled and reapplying the criteria when switching between DOM input elements in legacy WebKit. CVE-ID CVE-2014-4450 Secure Transport Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 when a cipher suite uses a block cipher in CBC mode. An attacker could force the use of SSL 3.0, even when the server would support a better TLS version, by blocking TLS 1.0 and higher connection attempts. This issue was addressed by disabling CBC cipher suites when TLS connection attempts fail. CVE-ID CVE-2014-3566 : Bodo Moeller, Thai Duong, and Krzysztof Kotowicz of Google Security Team Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "8.1". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJURUHQAAoJEBcWfLTuOo7tJMoP/2RPUJpecEmfPnrJHesyWE07 eGVLvu+Qo/VQN2X/aJI4ZxXiZzzEhbo9+HOEmE9hfBW+GwJ+tumOqJ/S0+8X6/BT 955fHTKT8zPHa1OvW2H+CEdeYtxIVTCb14ePmZMfykiyhvvk5HeODKPrj2fO7yL/ Bb9vggEkgZvssrXNQ3SXWLbzTobivaOjGNPXgELUFfCjjZH7Sdf9l8/r+NGR4c4w YFeDFqfPq9U7ebBt14oH5a+t3ha5uV0Zt1aKFtRkFdJlIwHFMbb7QSUQY1W24Kvt MKqpWQi1fR2x1k6p5ss6o8S/EeL5Vz6KsPnraWTRayC8w5r6IhVeOLbAEoaI0yON YoyY9LkFOwx68BZr8q7MyFdN+5iHrlYFG9bfSzIeZ1NmK4cfMgaG+jckoh/GtNjm voDOHL7qEjDgpAoYZ7XejVKvd5v7xXV8JcnDtmlg+rCh1eH/vyoYX4+PFUW3AiIo IkgUm0JvaZrOdXP1W2vIqFDHaxGoUMj4Ius+No7X+e4+uDACofBYP8btEdBf2mEW NBqc2jLZRaXbCpaHK1TCfeqSQLh32pUVWsgsK9ad4uH79tMke2EzyYkwztiksxT3 f4s8MGv2PdYnLjfWc4C5WN8ZbgdILVncTdNUItYvVya1nyuSXkCK6thWS35YEvDp ViMxSLY5YjSJvhzCf+hk =5AaA -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2014-4450 // JVNDB: JVNDB-2014-004903 // BID: 70660 // VULHUB: VHN-72390 // PACKETSTORM: 128769

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:lteversion:8.0.2

Trust: 1.0

vendor:applemodel:iosscope:ltversion:8.1 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.1 (iphone 4s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.1 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:8.0.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

sources: BID: 70660 // JVNDB: JVNDB-2014-004903 // CNNVD: CNNVD-201410-1166 // NVD: CVE-2014-4450

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-4450
value: LOW

Trust: 1.0

NVD: CVE-2014-4450
value: LOW

Trust: 0.8

CNNVD: CNNVD-201410-1166
value: LOW

Trust: 0.6

VULHUB: VHN-72390
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2014-4450
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-72390
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-72390 // JVNDB: JVNDB-2014-004903 // CNNVD: CNNVD-201410-1166 // NVD: CVE-2014-4450

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-72390 // JVNDB: JVNDB-2014-004903 // NVD: CVE-2014-4450

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201410-1166

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201410-1166

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004903

PATCH

title:HT6541url:http://support.apple.com/kb/HT6541

Trust: 0.8

title:HT6541url:http://support.apple.com/kb/HT6541?viewlocale=ja_JP

Trust: 0.8

title:iPhone7,2_8.1_12B411_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=52149

Trust: 0.6

sources: JVNDB: JVNDB-2014-004903 // CNNVD: CNNVD-201410-1166

EXTERNAL IDS

db:NVDid:CVE-2014-4450

Trust: 2.9

db:BIDid:70660

Trust: 1.4

db:SECTRACKid:1031077

Trust: 1.1

db:JVNDBid:JVNDB-2014-004903

Trust: 0.8

db:CNNVDid:CNNVD-201410-1166

Trust: 0.7

db:VULHUBid:VHN-72390

Trust: 0.1

db:PACKETSTORMid:128769

Trust: 0.1

sources: VULHUB: VHN-72390 // BID: 70660 // JVNDB: JVNDB-2014-004903 // PACKETSTORM: 128769 // CNNVD: CNNVD-201410-1166 // NVD: CVE-2014-4450

REFERENCES

url:http://www.securityfocus.com/archive/1/533747

Trust: 2.5

url:https://support.apple.com/kb/ht6541

Trust: 1.7

url:http://www.securityfocus.com/bid/70660

Trust: 1.1

url:http://www.securitytracker.com/id/1031077

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/97666

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4450

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-4450

Trust: 0.8

url:http://www.apple.com/ios/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4449

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4450

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4448

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4428

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.1

sources: VULHUB: VHN-72390 // BID: 70660 // JVNDB: JVNDB-2014-004903 // PACKETSTORM: 128769 // CNNVD: CNNVD-201410-1166 // NVD: CVE-2014-4450

CREDITS

Apple

Trust: 0.4

sources: BID: 70660 // PACKETSTORM: 128769

SOURCES

db:VULHUBid:VHN-72390
db:BIDid:70660
db:JVNDBid:JVNDB-2014-004903
db:PACKETSTORMid:128769
db:CNNVDid:CNNVD-201410-1166
db:NVDid:CVE-2014-4450

LAST UPDATE DATE

2025-04-13T21:27:18.311000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-72390date:2017-08-29T00:00:00
db:BIDid:70660date:2014-10-20T00:00:00
db:JVNDBid:JVNDB-2014-004903date:2014-10-23T00:00:00
db:CNNVDid:CNNVD-201410-1166date:2014-10-23T00:00:00
db:NVDid:CVE-2014-4450date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-72390date:2014-10-22T00:00:00
db:BIDid:70660date:2014-10-20T00:00:00
db:JVNDBid:JVNDB-2014-004903date:2014-10-23T00:00:00
db:PACKETSTORMid:128769date:2014-10-21T01:06:53
db:CNNVDid:CNNVD-201410-1166date:2014-10-23T00:00:00
db:NVDid:CVE-2014-4450date:2014-10-22T10:55:02.717