Vulnerability Name: | CVE-2014-4413 (CCN-96033) | ||||||||||||||||||||
Assigned: | 2014-09-17 | ||||||||||||||||||||
Published: | 2014-09-17 | ||||||||||||||||||||
Updated: | 2019-03-08 | ||||||||||||||||||||
Summary: | WebKit, as used in Apple iOS before 8 and Apple TV before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-09-17-1 and APPLE-SA-2014-09-17-2. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: APPLE Type: UNKNOWN APPLE-SA-2014-09-17-1 Source: APPLE Type: UNKNOWN APPLE-SA-2014-09-17-2 Source: MITRE Type: CNA CVE-2014-4413 Source: SECUNIA Type: UNKNOWN 61306 Source: SECUNIA Type: UNKNOWN 61318 Source: CONFIRM Type: Vendor Advisory http://support.apple.com/kb/HT6440 Source: CCN Type: Apple Web Site About the security content of iOS 8 Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT6441 Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT6442 Source: BID Type: UNKNOWN 69881 Source: CCN Type: BID-69881 WebKit Multiple Unspecified Memory Corruption Vulnerabilities Source: CCN Type: BID-69974 WebKit CVE-2014-4413 Unspecified Memory Corruption Vulnerability Source: SECTRACK Type: UNKNOWN 1030866 Source: XF Type: UNKNOWN apple-cve20144413-code-exec(96033) Source: XF Type: UNKNOWN apple-cve20144413-code-exec(96033) Source: GENTOO Type: UNKNOWN GLSA-201612-41 Source: CONFIRM Type: UNKNOWN https://support.apple.com/kb/HT6537 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |