| Vulnerability Name: | CVE-2014-4474 (CCN-99119) | ||||||||||||||||||||
| Assigned: | 2014-12-03 | ||||||||||||||||||||
| Published: | 2014-12-03 | ||||||||||||||||||||
| Updated: | 2019-03-08 | ||||||||||||||||||||
| Summary: | WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. | ||||||||||||||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
| Vulnerability Type: | CWE-399 | ||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2014-4474 Source: APPLE Type: Vendor Advisory APPLE-SA-2014-12-2-1 Source: APPLE Type: Vendor Advisory APPLE-SA-2015-01-27-1 Source: APPLE Type: Vendor Advisory APPLE-SA-2015-01-27-2 Source: APPLE Type: Patch, Vendor Advisory APPLE-SA-2015-06-30-6 Source: CCN Type: Apple Web site About the security content of Safari 8.0.1, Safari 7.1.1, and Safari 6.2.1 Source: CONFIRM Type: Vendor Advisory http://support.apple.com/HT204245 Source: CONFIRM Type: Vendor Advisory http://support.apple.com/HT204246 Source: CONFIRM Type: Vendor Advisory http://support.apple.com/kb/HT6596 Source: BID Type: UNKNOWN 71449 Source: CCN Type: BID-71449 WebKit CVE-2014-4474 Unspecified Memory Corruption Vulnerability Source: XF Type: UNKNOWN apple-safari-cve20144474-code-exec(99119) Source: CONFIRM Type: Vendor Advisory https://support.apple.com/kb/HT204949 | ||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
| BACK | |||||||||||||||||||||