About the security content of OS X Mavericks v10.9.5 and Security Update 2014-004

This document describes the security content of OS X Mavericks v10.9.5 and Security Update 2014-004.

This update can be downloaded and installed using Software Update or from the Apple Support website.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see Apple Security Updates.

Note: OS X Mavericks v10.9.5 includes the security content of Safari 7.0.6.

OS X Mavericks v10.9.5 and Security Update 2014-004

  • apache_mod_php

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: Multiple vulnerabilities in PHP 5.4.24

    Description: Multiple vulnerabilities existed in PHP 5.4.24, the most serious of which may have led to arbitrary code execution. This update addresses the issues by updating PHP to version 5.4.30

    CVE-ID

    CVE-2013-7345

    CVE-2014-0185

    CVE-2014-0207

    CVE-2014-0237

    CVE-2014-0238

    CVE-2014-1943

    CVE-2014-2270

    CVE-2014-3478

    CVE-2014-3479

    CVE-2014-3480

    CVE-2014-3487

    CVE-2014-3515

    CVE-2014-3981

    CVE-2014-4049

  • Bluetooth

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: A validation issue existed in the handling of a Bluetooth API call. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4390 : Ian Beer of Google Project Zero

  • CoreGraphics

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or an information disclosure

    Description: An out of bounds memory read existed in the handling of PDF files. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

  • CoreGraphics

    Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution

    Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

  • Foundation

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: An application using NSXMLParser may be misused to disclose information

    Description: An XML External Entity issue existed in NSXMLParser's handling of XML. This issue was addressed by not loading external entities across origins.

    CVE-ID

    CVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)

  • Intel Graphics Driver

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Compiling untrusted GLSL shaders may lead to an unexpected application termination or arbitrary code execution

    Description: A user-space buffer overflow existed in the shader compiler. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4393 : Apple

  • Intel Graphics Driver

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: Multiple validation issues existed in some integrated graphics driver routines. These issues were addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4394 : Ian Beer of Google Project Zero

    CVE-2014-4395 : Ian Beer of Google Project Zero

    CVE-2014-4396 : Ian Beer of Google Project Zero

    CVE-2014-4397 : Ian Beer of Google Project Zero

    CVE-2014-4398 : Ian Beer of Google Project Zero

    CVE-2014-4399 : Ian Beer of Google Project Zero

    CVE-2014-4400 : Ian Beer of Google Project Zero

    CVE-2014-4401 : Ian Beer of Google Project Zero

    CVE-2014-4416 : Ian Beer of Google Project Zero

  • IOAcceleratorFamily

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: A null pointer dereference existed in the handling of IOKit API arguments. This issue was addressed through improved validation of IOKit API arguments.

    CVE-ID

    CVE-2014-4376 : Ian Beer of Google Project Zero

  • IOAcceleratorFamily

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: An out-of-bounds read issue existed in the handling of an IOAcceleratorFamily function. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4402 : Ian Beer of Google Project Zero

  • IOHIDFamily

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization

    Description: An out-of-bounds read issue existed in the handling of an IOHIDFamily function. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4379 : Ian Beer of Google Project Zero

  • IOKit

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata.

    CVE-ID

    CVE-2014-4388 : @PanguTeam

  • IOKit

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4389 : Ian Beer of Google Project Zero

  • Kernel

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: A local user can infer kernel addresses and bypass kernel address space layout randomization

    Description: In some cases, the CPU Global Descriptor Table was allocated at a predictable address. This issue was addressed through always allocating the Global Descriptor Table at random addresses.

    CVE-ID

    CVE-2014-4403 : Ian Beer of Google Project Zero

  • Libnotify

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with root privileges

    Description: An out-of-bounds write issue existed in Libnotify. This issue was addressed through improved bounds checking

    CVE-ID

    CVE-2014-4381 : Ian Beer of Google Project Zero

  • OpenSSL

    Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Multiple vulnerabilities in OpenSSL 0.9.8y, including one that may lead to arbitrary code execution

    Description: Multiple vulnerabilities existed in OpenSSL 0.9.8y. This update was addressed by updating OpenSSL to version 0.9.8za.

    CVE-ID

    CVE-2014-0076

    CVE-2014-0195

    CVE-2014-0221

    CVE-2014-0224

    CVE-2014-3470

  • QT Media Foundation

    Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution

    Description: A memory corruption issue existed in the handling of RLE encoded movie files. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom Gallagher & Paul Bates working with HP's Zero Day Initiative

  • QT Media Foundation

    Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Playing a maliciously crafted MIDI file may lead to an unexpected application termination or arbitrary code execution

    Description: A buffer overflow existed in the handling of MIDI files. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative

  • QT Media Foundation

    Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution

    Description: A memory corruption issue existed in the handling of the 'mvhd' atoms. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day Initiative

  • ruby

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: A remote attacker may be able to cause arbitrary code execution

    Description: A heap buffer overflow existed in LibYAML's handling of percent-encoded characters in a URI. This issue was addressed through improved bounds checking. This update addresses the issues by updating LibYAML to version 0.1.6

    CVE-ID

    CVE-2014-2525

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: