ID

VAR-201501-0255


CVE

CVE-2014-8817


TITLE

Apple OS X of CoreSymbolication Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2015-001299

DESCRIPTION

coresymbolicationd in CoreSymbolication in Apple OS X before 10.10.2 does not verify that expected data types are present in XPC messages, which allows attackers to execute arbitrary code in a privileged context via a crafted app, as demonstrated by lack of verification of xpc_dictionary_get_value API return values during handling of a (1) match_mmap_archives, (2) delete_mmap_archives, (3) write_mmap_archive, or (4) read_mmap_archive command. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlAn attacker could execute arbitrary code in a privileged context through a crafted application. Apple Mac OS X is prone to multiple security vulnerabilities. The update addresses new vulnerabilities that affect Bluetooth, CPU Software, CommerceKit Framework, CoreGraphics, CoreSymbolication, Intel Graphics Driver, IOHIDFamily, IOUSBFamily, Kernel, LaunchServices, LoginWindow, Sandbox, SceneKit, security, security_taskgate, Spotlight, SpotlightIndex, sysmond, and UserAccountUpdater components. Attackers can exploit these issues to execute arbitrary code, gain unauthorized access, bypass security restrictions, disclose sensitive information and perform other attacks. Failed attacks may cause denial-of-service conditions. These issues affect OS X prior to 10.10.2. The vulnerability stems from the fact that the program does not validate the data types in XPC messages

Trust: 1.98

sources: NVD: CVE-2014-8817 // JVNDB: JVNDB-2015-001299 // BID: 72328 // VULHUB: VHN-76762

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.10.1

Trust: 1.4

vendor:applemodel:mac os xscope:lteversion:10.10.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.10

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.8.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.9.5

Trust: 0.8

vendor:applemodel:mac osscope:eqversion:x10.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.1

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.10.3

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.10.2

Trust: 0.3

sources: BID: 72328 // JVNDB: JVNDB-2015-001299 // CNNVD: CNNVD-201501-751 // NVD: CVE-2014-8817

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-8817
value: HIGH

Trust: 1.0

NVD: CVE-2014-8817
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201501-751
value: CRITICAL

Trust: 0.6

VULHUB: VHN-76762
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-8817
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-76762
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-76762 // JVNDB: JVNDB-2015-001299 // CNNVD: CNNVD-201501-751 // NVD: CVE-2014-8817

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-76762 // JVNDB: JVNDB-2015-001299 // NVD: CVE-2014-8817

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201501-751

TYPE

Unknown

Trust: 0.3

sources: BID: 72328

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001299

PATCH

title:APPLE-SA-2015-01-27-4url:http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html

Trust: 0.8

title:HT204244url:http://support.apple.com/en-us/HT204244

Trust: 0.8

title:HT204244url:http://support.apple.com/ja-jp/HT204244

Trust: 0.8

sources: JVNDB: JVNDB-2015-001299

EXTERNAL IDS

db:NVDid:CVE-2014-8817

Trust: 2.8

db:SECTRACKid:1031650

Trust: 1.1

db:BIDid:72328

Trust: 0.9

db:JVNid:JVNVU96447236

Trust: 0.8

db:JVNDBid:JVNDB-2015-001299

Trust: 0.8

db:CNNVDid:CNNVD-201501-751

Trust: 0.7

db:VULHUBid:VHN-76762

Trust: 0.1

sources: VULHUB: VHN-76762 // BID: 72328 // JVNDB: JVNDB-2015-001299 // CNNVD: CNNVD-201501-751 // NVD: CVE-2014-8817

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html

Trust: 1.1

url:http://support.apple.com/ht204244

Trust: 1.1

url:https://code.google.com/p/google-security-research/issues/detail?id=80

Trust: 1.1

url:http://www.securitytracker.com/id/1031650

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/100496

Trust: 1.1

url:http://www.apple.com/macosx/

Trust: 0.9

url:https://support.apple.com/en-us/ht204659

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8817

Trust: 0.8

url:http://jvn.jp/vu/jvnvu96447236/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8817

Trust: 0.8

url:https://www.securityfocus.com/bid/72328

Trust: 0.6

sources: VULHUB: VHN-76762 // BID: 72328 // JVNDB: JVNDB-2015-001299 // CNNVD: CNNVD-201501-751 // NVD: CVE-2014-8817

CREDITS

Vitaliy Toropov working with HP's Zero Day Initiative, Roberto Paleari and Aristide Fattori of Emaze Networks, Sten Petersen, Mike Myers,Ian Beer of Google Project Zero, Ale, @PanguTeam, Trammell Hudson of Two Sigma Investments, Alex, of Digital Operatives LLC

Trust: 0.6

sources: CNNVD: CNNVD-201501-751

SOURCES

db:VULHUBid:VHN-76762
db:BIDid:72328
db:JVNDBid:JVNDB-2015-001299
db:CNNVDid:CNNVD-201501-751
db:NVDid:CVE-2014-8817

LAST UPDATE DATE

2025-04-13T20:47:46.538000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-76762date:2017-09-08T00:00:00
db:BIDid:72328date:2019-04-12T18:00:00
db:JVNDBid:JVNDB-2015-001299date:2015-02-12T00:00:00
db:CNNVDid:CNNVD-201501-751date:2019-04-15T00:00:00
db:NVDid:CVE-2014-8817date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-76762date:2015-01-30T00:00:00
db:BIDid:72328date:2015-01-27T00:00:00
db:JVNDBid:JVNDB-2015-001299date:2015-02-12T00:00:00
db:CNNVDid:CNNVD-201501-751date:2015-01-27T00:00:00
db:NVDid:CVE-2014-8817date:2015-01-30T11:59:29.577