Vulnerability Name: | CVE-2014-4404 (CCN-96111) | ||||||||
Assigned: | 2014-09-17 | ||||||||
Published: | 2014-09-17 | ||||||||
Updated: | 2019-03-08 | ||||||||
Summary: | Heap-based buffer overflow in IOHIDFamily in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context via an application that provides crafted key-mapping properties. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.7 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
7.7 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: APPLE Type: UNKNOWN APPLE-SA-2014-09-17-1 Source: APPLE Type: UNKNOWN APPLE-SA-2014-09-17-2 Source: APPLE Type: UNKNOWN APPLE-SA-2014-10-16-1 Source: MITRE Type: CNA CVE-2014-4404 Source: APPLE Type: Vendor Advisory APPLE-SA-2015-04-08-2 Source: CCN Type: Apple Web site About the security content of iOS 8 Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT6441 Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT6442 Source: BID Type: UNKNOWN 69882 Source: CCN Type: BID-69882 RETIRED: Apple iOS Prior to iOS 8 and TV Prior to TV 7 Multiple Vulnerabilities Source: BID Type: UNKNOWN 69947 Source: CCN Type: BID-69947 Apple TV and iOS CVE-2014-4404 Heap Based Buffer Overflow Vulnerability Source: SECTRACK Type: UNKNOWN 1030866 Source: XF Type: UNKNOWN appleios-cve20144404-bo(96111) Source: XF Type: UNKNOWN appleios-cve20144404-bo(96111) Source: CCN Type: Packet Storm Security [12-02-2014] Mac OS X IOKit Keyboard Driver Root Privilege Escalation Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT204659 Source: CONFIRM Type: UNKNOWN https://support.apple.com/kb/HT6535 Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY KNOWN EXPLOITED VULNERABILITIES CATALOG Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [12-02-2014] | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||
BACK |