Vulnerability Description
Mail Service in Apple OS X Server before 4.0 does not enforce SACL changes until after a service restart, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging a change made by an administrator.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Os X Server | <= 3.1.2 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- http://www.securitytracker.com/id/1031071
- https://exchange.xforce.ibmcloud.com/vulnerabilities/97645
- https://support.apple.com/kb/HT6536Vendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- http://www.securitytracker.com/id/1031071
- https://exchange.xforce.ibmcloud.com/vulnerabilities/97645
- https://support.apple.com/kb/HT6536Vendor Advisory
FAQ
What is CVE-2014-4446?
CVE-2014-4446 is a vulnerability with a CVSS score of 2.1 (LOW). Mail Service in Apple OS X Server before 4.0 does not enforce SACL changes until after a service restart, which allows remote authenticated users to bypass intended access restrictions in opportunisti...
How severe is CVE-2014-4446?
CVE-2014-4446 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-4446?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Os X Server.