CVE-2014-4403

The kernel in Apple OS X before 10.9.5 allows local users to obtain sensitive address information and bypass the ASLR protection mechanism by leveraging predictability of the location of the CPU Global Descriptor Table.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.9.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.9.4:*:*:*:*:*:*:*

History

21 Nov 2024, 02:10

Type Values Removed Values Added
References () http://support.apple.com/kb/HT6443 - Vendor Advisory () http://support.apple.com/kb/HT6443 - Vendor Advisory
References () http://www.securityfocus.com/bid/69910 - () http://www.securityfocus.com/bid/69910 -
References () http://www.securitytracker.com/id/1030868 - () http://www.securitytracker.com/id/1030868 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/96064 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/96064 -

Information

Published : 2014-09-19 10:55

Updated : 2025-04-12 10:46


NVD link : CVE-2014-4403

Mitre link : CVE-2014-4403

CVE.ORG link : CVE-2014-4403


JSON object : View

Products Affected

apple

  • mac_os_x
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor