Vulnerabilities > Apple > MAC OS X > 10.3.5

DATE CVE VULNERABILITY TITLE RISK
2014-07-01 CVE-2014-1370 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple mac OS X and mac OS X Server
The byte-swapping implementation in copyfile in Apple OS X before 10.9.4 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds memory access and application crash) via a crafted AppleDouble file in a ZIP archive.
network
apple CWE-119
6.8
2014-05-19 CVE-2013-7040 Cryptographic Issues vulnerability in multiple products
Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
network
apple python CWE-310
4.3
2014-04-23 CVE-2014-1322 Information Exposure vulnerability in Apple mac OS X
The kernel in Apple OS X through 10.9.2 places a kernel pointer into an XNU object data structure accessible from user space, which makes it easier for local users to bypass the ASLR protection mechanism by reading an unspecified attribute of the object.
local
low complexity
apple CWE-200
4.9
2014-04-23 CVE-2014-1320 Information Exposure vulnerability in Apple Iphone OS, mac OS X and Tvos
IOKit in Apple iOS before 7.1.1, Apple OS X through 10.9.2, and Apple TV before 6.1.1 places kernel pointers into an object data structure, which makes it easier for local users to bypass the ASLR protection mechanism by reading unspecified attributes of the object.
local
low complexity
apple CWE-200
4.9
2014-04-23 CVE-2014-1318 Improper Input Validation vulnerability in Apple mac OS X
The Intel Graphics Driver in Apple OS X through 10.9.2 does not properly validate a certain pointer, which allows attackers to execute arbitrary code via a crafted application.
network
low complexity
apple CWE-20
critical
10.0
2014-04-23 CVE-2014-1316 Improper Input Validation vulnerability in Apple mac OS X
Heimdal, as used in Apple OS X through 10.9.2, allows remote attackers to cause a denial of service (abort and daemon exit) via ASN.1 data encountered in the Kerberos 5 protocol.
network
low complexity
apple CWE-20
5.0
2014-04-23 CVE-2014-1314 Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X
WindowServer in Apple OS X through 10.9.2 does not prevent session creation by a sandboxed application, which allows attackers to bypass the sandbox protection mechanism and execute arbitrary code via a crafted application.
network
low complexity
apple CWE-264
critical
10.0
2014-04-23 CVE-2014-1296 Permissions, Privileges, and Access Controls vulnerability in Apple products
CFNetwork in Apple iOS before 7.1.1, Apple OS X through 10.9.2, and Apple TV before 6.1.1 does not ensure that a Set-Cookie HTTP header is complete before interpreting the header's value, which allows remote attackers to bypass intended access restrictions by triggering the closing of a TCP connection during transmission of a header, as demonstrated by an HTTPOnly restriction.
network
apple CWE-264
4.3
2014-04-22 CVE-2013-7338 Improper Input Validation vulnerability in multiple products
Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.
network
python apple CWE-20
7.1
2014-03-11 CVE-2014-0106 Improper Input Validation vulnerability in multiple products
Sudo 1.6.9 before 1.8.5, when env_reset is disabled, does not properly check environment variables for the env_delete restriction, which allows local users with sudo permissions to bypass intended command restrictions via a crafted environment variable.
6.6