CVE-2014-1372 (GCVE-0-2014-1372)

Vulnerability from cvelistv5 – Published: 2014-07-01 10:00 – Updated: 2024-08-06 09:42
VLAI?
Summary
Graphics Driver in Apple OS X before 10.9.4 does not properly restrict read operations during processing of an unspecified system call, which allows local users to obtain sensitive information from kernel memory and bypass the ASLR protection mechanism via a crafted call.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://support.apple.com/kb/HT6296 x_refsource_CONFIRM
http://www.securitytracker.com/id/1030505 vdb-entryx_refsource_SECTRACK
http://archives.neohapsis.com/archives/bugtraq/20… vendor-advisoryx_refsource_APPLE
https://code.google.com/p/google-security-researc… x_refsource_MISC
http://secunia.com/advisories/59475 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:42:34.866Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT6296"
          },
          {
            "name": "1030505",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030505"
          },
          {
            "name": "APPLE-SA-2014-06-30-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/google-security-research/issues/detail?id=18"
          },
          {
            "name": "59475",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/59475"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Graphics Driver in Apple OS X before 10.9.4 does not properly restrict read operations during processing of an unspecified system call, which allows local users to obtain sensitive information from kernel memory and bypass the ASLR protection mechanism via a crafted call."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-11-28T05:57:01",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT6296"
        },
        {
          "name": "1030505",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030505"
        },
        {
          "name": "APPLE-SA-2014-06-30-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://code.google.com/p/google-security-research/issues/detail?id=18"
        },
        {
          "name": "59475",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/59475"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2014-1372",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Graphics Driver in Apple OS X before 10.9.4 does not properly restrict read operations during processing of an unspecified system call, which allows local users to obtain sensitive information from kernel memory and bypass the ASLR protection mechanism via a crafted call."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.apple.com/kb/HT6296",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT6296"
            },
            {
              "name": "1030505",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1030505"
            },
            {
              "name": "APPLE-SA-2014-06-30-2",
              "refsource": "APPLE",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html"
            },
            {
              "name": "https://code.google.com/p/google-security-research/issues/detail?id=18",
              "refsource": "MISC",
              "url": "https://code.google.com/p/google-security-research/issues/detail?id=18"
            },
            {
              "name": "59475",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/59475"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2014-1372",
    "datePublished": "2014-07-01T10:00:00",
    "dateReserved": "2014-01-08T00:00:00",
    "dateUpdated": "2024-08-06T09:42:34.866Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"10.9.3\", \"matchCriteriaId\": \"8EB864BA-7FED-47E3-9391-B89598594AF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2082D62-3821-4DBA-8690-67489F44C38D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F0DB1BC-DC16-423E-B0C7-8E9C996A50B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E59315BA-B9F1-46A5-86E7-8BE2ED97BA4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55841123-F78F-42E0-8D40-C688C4B4D29C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"252640D3-5CB8-4C3D-9E8B-ED452293C805\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3D30B4B-DA63-40B0-B0C9-F3992CF25706\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.8.5:supplemental_update:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F1DAD30-BA77-40C2-9245-05DF871FDDC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A48A5310-A589-4E9B-99BC-F840CC1A6A44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F241EBFB-CCB3-4D16-B476-AC1578D3C435\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AEAD650-87D1-49BB-A8C7-BA39FD47285C\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Graphics Driver in Apple OS X before 10.9.4 does not properly restrict read operations during processing of an unspecified system call, which allows local users to obtain sensitive information from kernel memory and bypass the ASLR protection mechanism via a crafted call.\"}, {\"lang\": \"es\", \"value\": \"Graphics Driver en Apple OS X anterior a 10.9.4 no restringe debidamente operaciones de lectura durante el procesamiento de una llamada del sistema no especificada, lo que permite a usuarios locales obtener informaci\\u00f3n sensible de la memoria del kernel y evadir el mecanismo de protecci\\u00f3n ASLR a trav\\u00e9s de una llamada manipulada.\"}]",
      "id": "CVE-2014-1372",
      "lastModified": "2024-11-21T02:04:10.353",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:N/A:N\", \"baseScore\": 4.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2014-07-01T10:17:27.220",
      "references": "[{\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://secunia.com/advisories/59475\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://support.apple.com/kb/HT6296\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.securitytracker.com/id/1030505\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://code.google.com/p/google-security-research/issues/detail?id=18\", \"source\": \"product-security@apple.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/59475\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT6296\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1030505\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://code.google.com/p/google-security-research/issues/detail?id=18\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}]",
      "sourceIdentifier": "product-security@apple.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-1372\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2014-07-01T10:17:27.220\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Graphics Driver in Apple OS X before 10.9.4 does not properly restrict read operations during processing of an unspecified system call, which allows local users to obtain sensitive information from kernel memory and bypass the ASLR protection mechanism via a crafted call.\"},{\"lang\":\"es\",\"value\":\"Graphics Driver en Apple OS X anterior a 10.9.4 no restringe debidamente operaciones de lectura durante el procesamiento de una llamada del sistema no especificada, lo que permite a usuarios locales obtener informaci\u00f3n sensible de la memoria del kernel y evadir el mecanismo de protecci\u00f3n ASLR a trav\u00e9s de una llamada manipulada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:N/A:N\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.9.3\",\"matchCriteriaId\":\"8EB864BA-7FED-47E3-9391-B89598594AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2082D62-3821-4DBA-8690-67489F44C38D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F0DB1BC-DC16-423E-B0C7-8E9C996A50B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E59315BA-B9F1-46A5-86E7-8BE2ED97BA4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55841123-F78F-42E0-8D40-C688C4B4D29C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"252640D3-5CB8-4C3D-9E8B-ED452293C805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D30B4B-DA63-40B0-B0C9-F3992CF25706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.8.5:supplemental_update:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F1DAD30-BA77-40C2-9245-05DF871FDDC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48A5310-A589-4E9B-99BC-F840CC1A6A44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F241EBFB-CCB3-4D16-B476-AC1578D3C435\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AEAD650-87D1-49BB-A8C7-BA39FD47285C\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://secunia.com/advisories/59475\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://support.apple.com/kb/HT6296\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.securitytracker.com/id/1030505\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://code.google.com/p/google-security-research/issues/detail?id=18\",\"source\":\"product-security@apple.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT6296\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1030505\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.google.com/p/google-security-research/issues/detail?id=18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…