CVE-2014-1379
Description
Graphics Drivers in Apple OS X before 10.9.4 allows attackers to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a 32-bit executable file for a crafted application.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A NULL pointer dereference in Apple OS X Graphics Drivers allows privilege escalation or system crash via a crafted 32-bit executable.
Vulnerability
A NULL pointer dereference vulnerability exists in the Graphics Drivers component of Apple OS X. The flaw is triggered when a crafted 32-bit executable file is run. Affected versions include OS X Mavericks 10.9 through 10.9.3, as well as earlier versions such as OS X Lion and Mountain Lion (as indicated by the security update scope). The vulnerability can be exploited by any application that can execute a malicious 32-bit binary, leading to a kernel-level crash or potential privilege escalation.
Exploitation
An attacker must have the ability to run a crafted 32-bit executable on the target system. No special privileges are required to launch the application; the exploit occurs when the Graphics Drivers process the malformed executable. The attacker does not need network access if they can already execute code locally. The exploitation sequence involves the attacker providing a specially crafted 32-bit binary that triggers a NULL pointer dereference in the graphics driver code.
Impact
Successful exploitation can result in either a denial of service (system crash due to the NULL pointer dereference) or privilege escalation. If the attacker achieves privilege escalation, they may gain elevated system privileges, potentially leading to full control of the affected system. The impact is limited to the local system and requires the attacker to have some level of local access.
Mitigation
Apple addressed this vulnerability in OS X Mavericks v10.9.4, released on July 1, 2014. The update is available via Software Update or from the Apple Support website [1]. No workarounds are documented. Users should apply the update to all affected versions, including OS X Lion, Mountain Lion, and Mavericks. This CVE is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
12cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*+ 10 more
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*range: <=10.9.3
- cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.8.5:supplemental_update:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*
- Range: <10.9.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.