← Zuruck zu CVEs
CVE-2014-8835
N/ABeschreibung
The xpc_data_get_bytes function in libxpc in Apple OS X before 10.10.2 does not verify that a dictionary's Attributes key has the xpc_data data type, which allows attackers to execute arbitrary code by providing a crafted dictionary to sysmond, related to an "XPC type confusion" issue.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht1/30/2015
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apple:mac_os_x
Schwachen (CWE)
CWE-19
Referenzen
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html(product-security@apple.com)
http://packetstormsecurity.com/files/135701/OS-X-Sysmond-XPC-Type-Confusion-Privilege-Escalation.html(product-security@apple.com)
http://support.apple.com/HT204244(product-security@apple.com)
http://www.exploit-db.com/exploits/35742/(product-security@apple.com)
http://www.securityfocus.com/bid/71992(product-security@apple.com)
http://www.securitytracker.com/id/1031650(product-security@apple.com)
https://code.google.com/p/google-security-research/issues/detail?id=121(product-security@apple.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/100530(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/135701/OS-X-Sysmond-XPC-Type-Confusion-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/HT204244(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/35742/(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/71992(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1031650(af854a3a-2127-422b-91ae-364da2661108)
https://code.google.com/p/google-security-research/issues/detail?id=121(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/100530(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.