VYPR
Unrated severityNVD Advisory· Published Oct 18, 2014· Updated May 6, 2026

CVE-2014-4442

CVE-2014-4442

Description

The kernel in Apple OS X before 10.10 allows local users to cause a denial of service (panic) via a message to a system control socket.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Local users can trigger a kernel panic in OS X before 10.10 by sending a crafted message to a system control socket.

Vulnerability

The vulnerability resides in the kernel of Apple OS X versions prior to 10.10 (Yosemite). A local user can cause a denial of service (kernel panic) by sending a specially crafted message to a system control socket. The affected code path is reachable without any special privileges beyond local access to the system.

Exploitation

An attacker must have local access to the system and the ability to send messages to system control sockets. No authentication or user interaction beyond local login is required. The attacker crafts a malicious message and delivers it to a system control socket, triggering a kernel panic.

Impact

Successful exploitation results in a kernel panic, causing an immediate denial of service. The system becomes unresponsive and must be rebooted. No data corruption or privilege escalation is reported; the impact is limited to availability.

Mitigation

Apple addressed this issue in OS X Yosemite v10.10. Users should upgrade to OS X 10.10 or later to mitigate the vulnerability. No workarounds are documented for unpatched systems. The fix is confirmed in the Apple security content for OS X Yosemite v10.10 [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.