Описание
The kernel in Apple iOS before 8 and Apple TV before 7 uses a predictable random number generator during the early portion of the boot process, which allows attackers to bypass certain kernel-hardening protection mechanisms by using a user-space process to observe data related to the random numbers.
The kernel in Apple iOS before 8 and Apple TV before 7 uses a predictable random number generator during the early portion of the boot process, which allows attackers to bypass certain kernel-hardening protection mechanisms by using a user-space process to observe data related to the random numbers.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-4422
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96096
- https://support.apple.com/kb/HT6535
- http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html
- http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
- http://support.apple.com/kb/HT6441
- http://support.apple.com/kb/HT6442
- http://www.securityfocus.com/bid/69882
- http://www.securityfocus.com/bid/69911
- http://www.securitytracker.com/id/1030866
Связанные уязвимости
The kernel in Apple iOS before 8 and Apple TV before 7 uses a predictable random number generator during the early portion of the boot process, which allows attackers to bypass certain kernel-hardening protection mechanisms by using a user-space process to observe data related to the random numbers.