Files
CVEs-PoC/2014/CVE-2014-1322.md
T
2024-05-26 14:27:05 +02:00

18 lines
725 B
Markdown

### [CVE-2014-1322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1322)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The kernel in Apple OS X through 10.9.2 places a kernel pointer into an XNU object data structure accessible from user space, which makes it easier for local users to bypass the ASLR protection mechanism by reading an unspecified attribute of the object.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/raymondpittman/IPC-Memory-Mac-OSX-Exploit