VYPR
Unrated severityNVD Advisory· Published Jan 30, 2015· Updated May 6, 2026

CVE-2014-8829

CVE-2014-8829

Description

SceneKit in Apple OS X before 10.10.2 allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted app.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SceneKit in Apple OS X before 10.10.2 contains an out-of-bounds write vulnerability that can lead to arbitrary code execution or denial of service via a crafted app.

Vulnerability

SceneKit in Apple OS X prior to version 10.10.2 contains an out-of-bounds write vulnerability. The issue exists in the handling of crafted applications, allowing an attacker to trigger a memory corruption condition. Affected versions include OS X Yosemite 10.10 and 10.10.1, as well as earlier versions [1].

Exploitation

An attacker must convince a user to run a specially crafted application on the affected system. No additional privileges or network access are required beyond the ability to execute the malicious app. The exploitation does not require user interaction beyond launching the app [1].

Impact

Successful exploitation can lead to arbitrary code execution in the context of the current user, or cause a denial of service due to the out-of-bounds write. The attacker gains the ability to execute arbitrary code or crash the application [1].

Mitigation

Apple addressed this vulnerability in OS X Yosemite v10.10.2 and Security Update 2015-001, released on January 27, 2015. Users should update to the latest version of OS X to remediate the issue. No workarounds are available [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.