libnetcore in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not verify that certain values have the expected data type, which allows attackers to execute arbitrary code in an _networkd context via a crafted XPC message from a sandboxed app, as demonstrated by lack of verification of the XPC dictionary data type.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/134393/Mac-OS-X-Networkd-XPC-Type-Confusion-Sandbox-Escape.html | |
https://code.google.com/p/google-security-research/issues/detail?id=92 | exploit |
http://www.osvdb.org/114862 | vdb entry |
http://support.apple.com/HT204245 | vendor advisory |
http://support.apple.com/HT204246 | vendor advisory |
http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html | vendor advisory |
http://support.apple.com/HT204244 | vendor advisory |
http://www.exploit-db.com/exploits/35847 | exploit |
http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html | vendor advisory |
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html | vendor advisory |