ID CVE-2014-8834 Type cve Reporter NVD Modified 2017-09-07T21:29:29
Description
UserAccountUpdater in Apple OS X 10.10 before 10.10.2 stores a PDF document's password in a printing preference file, which allows local users to obtain sensitive information by reading a file.
{"title": "CVE-2014-8834", "reporter": "NVD", "published": "2015-01-30T06:59:43", "cpe": ["cpe:/o:apple:mac_os_x:10.10.0", "cpe:/o:apple:mac_os_x:10.10.1"], "cvelist": ["CVE-2014-8834"], "viewCount": 1, "objectVersion": "1.3", "type": "cve", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8834", "bulletinFamily": "NVD", "hashmap": [{"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "1f6510fe8fc47d24a998591e1314dfa1", "key": "cpe"}, {"hash": "301d91a39e8e7050c8606c68b68d2d68", "key": "cvelist"}, {"hash": "635d7f080910dc81e99c0ca9b0d4203f", "key": "cvss"}, {"hash": "56516fbe439b5ecbccdcf0506aa0bfd6", "key": "description"}, {"hash": "8e1ccdc08a1c2918457ba0ddea240798", "key": "href"}, {"hash": "40cac041ec428c273d6e1067c503e9d4", "key": "modified"}, {"hash": "76ea1f3b062e1ee4e9f0b56c47881824", "key": "published"}, {"hash": "12568f86477087a0bedc35800b407b2c", "key": "references"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "075079de2b246bc80697e8765eabab29", "key": "title"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}], "history": [{"bulletin": {"reporter": "NVD", "published": "2015-01-30T06:59:43", "cvelist": ["CVE-2014-8834"], "title": "CVE-2014-8834", "objectVersion": "1.2", "description": "UserAccountUpdater in Apple OS X 10.10 before 10.10.2 stores a PDF document's password in a printing preference file, which allows local users to obtain sensitive information by reading a file.", "type": "cve", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8834", "bulletinFamily": "NVD", "id": "CVE-2014-8834", "history": [], "scanner": [], "enchantments": {}, "modified": "2015-11-23T13:31:13", "hash": "3ca13d8961318785e36e52d34a323ee9e8f0fbcac28ac176a6694c5b622ddeb3", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "viewCount": 1, "edition": 1, "cpe": ["cpe:/o:apple:mac_os_x:10.10.0", "cpe:/o:apple:mac_os_x:10.10.1"], "references": ["http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", "http://support.apple.com/HT204244", "http://www.securitytracker.com/id/1031650", "http://xforce.iss.net/xforce/xfdb/100531"], "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "635d7f080910dc81e99c0ca9b0d4203f", "key": "cvss"}, {"hash": "f08412726ce82d1b3ebf1eb5e852a3e6", "key": "modified"}, {"hash": "301d91a39e8e7050c8606c68b68d2d68", "key": "cvelist"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "76ea1f3b062e1ee4e9f0b56c47881824", "key": "published"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "075079de2b246bc80697e8765eabab29", "key": "title"}, {"hash": "932438f452a935487bfbe8e091afc584", "key": "references"}, {"hash": "1f6510fe8fc47d24a998591e1314dfa1", "key": "cpe"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "8e1ccdc08a1c2918457ba0ddea240798", "key": "href"}, {"hash": "56516fbe439b5ecbccdcf0506aa0bfd6", "key": "description"}], "lastseen": "2016-09-03T21:32:37", "assessment": {"name": "", "href": "", "system": ""}}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T21:32:37"}], "scanner": [], "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "modified": "2017-09-07T21:29:29", "hash": "1868fe2c3c7b119595d879c5687322b20da783d97fc44f41d8caa1944742935e", "enchantments": {"vulnersScore": 2.1}, "edition": 2, "description": "UserAccountUpdater in Apple OS X 10.10 before 10.10.2 stores a PDF document's password in a printing preference file, which allows local users to obtain sensitive information by reading a file.", "references": ["https://exchange.xforce.ibmcloud.com/vulnerabilities/100531", "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", "http://support.apple.com/HT204244", "http://www.securitytracker.com/id/1031650"], "id": "CVE-2014-8834", "lastseen": "2017-09-08T10:27:07", "assessment": {"name": "", "href": "", "system": ""}}
{"result": {"openvas": [{"id": "OPENVAS:1361412562310805483", "type": "openvas", "title": "Apple Mac OS X Multiple Vulnerabilities -01 Mar15", "description": "This host is running Apple Mac OS X and\n is prone to multiple vulnerabilities.", "published": "2015-03-05T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805483", "cvelist": ["CVE-2014-8834", "CVE-2014-4497", "CVE-2014-4499", "CVE-2014-8816", "CVE-2014-8819", "CVE-2014-8833", "CVE-2014-8823", "CVE-2014-8820", "CVE-2014-8827", "CVE-2014-8830", "CVE-2014-8831", "CVE-2014-8817", "CVE-2014-8821", "CVE-2014-8822", "CVE-2014-8824", "CVE-2014-4498", "CVE-2014-8825", "CVE-2014-8832", "CVE-2014-8838", "CVE-2014-8826", "CVE-2014-8829", "CVE-2014-8835", "CVE-2014-8828", "CVE-2014-8837"], "lastseen": "2017-07-24T12:53:20"}], "nessus": [{"id": "MACOSX_10_10_2.NASL", "type": "nessus", "title": "Mac OS X 10.10.x < 10.10.2 Multiple Vulnerabilities (POODLE)", "description": "The remote host is running a version of Mac OS X 10.10.x that is prior to version 10.10.2. This update contains several security-related fixes for the following components :\n\n - bash\n - Bluetooth\n - CFNetwork Cache\n - CommerceKit Framework\n - CoreGraphics\n - CoreSymbolication\n - CPU Software\n - FontParser\n - Foundation\n - Intel Graphics Driver\n - IOAcceleratorFamily\n - IOHIDFamily\n - IOKit\n - IOUSBFamily\n - Kernel\n - LaunchServices\n - libnetcore\n - LoginWindow\n - lukemftp\n - OpenSSL\n - Safari\n - SceneKit\n - Security\n - security_taskgate\n - Spotlight\n - SpotlightIndex\n - sysmond\n - UserAccountUpdater\n\nNote that successful exploitation of the most serious issues can result in arbitrary code execution.", "published": "2015-01-29T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=81087", "cvelist": ["CVE-2014-8834", "CVE-2014-3566", "CVE-2014-4489", "CVE-2014-4499", "CVE-2014-4371", "CVE-2014-4491", "CVE-2014-8819", "CVE-2014-3192", "CVE-2014-8833", "CVE-2014-4488", "CVE-2014-8823", "CVE-2014-4479", "CVE-2014-8820", "CVE-2014-8517", "CVE-2014-8827", "CVE-2014-4477", "CVE-2014-6277", "CVE-2014-1595", "CVE-2014-4421", "CVE-2014-8830", "CVE-2014-8831", "CVE-2014-8817", "CVE-2014-4495", "CVE-2014-8821", "CVE-2014-4481", "CVE-2014-4461", "CVE-2014-8839", "CVE-2014-8822", "CVE-2014-8824", "CVE-2014-4498", "CVE-2014-7187", "CVE-2014-3567", "CVE-2014-4487", "CVE-2014-8825", "CVE-2014-4460", "CVE-2014-4484", "CVE-2014-8836", "CVE-2014-8832", "CVE-2014-4485", "CVE-2014-8838", "CVE-2014-4420", "CVE-2014-8826", "CVE-2014-3568", "CVE-2014-4492", "CVE-2014-4389", "CVE-2014-8835", "CVE-2014-7186", "CVE-2014-4483", "CVE-2014-4486", "CVE-2014-4476", "CVE-2014-4419", "CVE-2014-8837"], "lastseen": "2017-11-02T22:48:50"}]}}