SB2023051860 - Multiple vulnerabilities in macOS Ventura
Published: May 18, 2023 Updated: November 29, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 63 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2023-32409)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger memory corruption and break out of Web Content sandbox.
Note, the vulnerability is being actively exploited in the wild.
2) Out-of-bounds read (CVE-ID: CVE-2023-28204)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in WebKit. A remote attacker can trick the victim to visit a specially crafted webpage, trigger an out-of-bounds read error and read contents of memory on the system.
Note, the vulnerability is being actively exploited in the wild.
3) Use-after-free (CVE-ID: CVE-2023-32373)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note, the vulnerability is being actively exploited in the wild.
4) Out-of-bounds read (CVE-ID: CVE-2023-32382)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition when processing 3D models in Model I/O. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.
5) Security features bypass (CVE-ID: CVE-2023-32388)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to a privacy issue when writing data to log entries in Accessibility component. A local application can bypass Privacy preferences.
6) Out-of-bounds read (CVE-ID: CVE-2023-32372)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted EXR file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.
7) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-32400)
The vulnerability allows a local application to gain access to otherwise restricted functionality.
The vulnerability exists due to improper checks in Accessibility application. Entitlements and privacy permissions granted to this application may be used by a malicious app.
8) Improper Privilege Management (CVE-ID: CVE-2023-32411)
The vulnerability allows a local application to escalate privileges.
The vulnerability exists due to improper privilege management in AppleMobileFileIntegrity. A local application can bypass Privacy preferences.
9) Security features bypass (CVE-ID: CVE-2023-32371)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists in Associated Domains. A local application can break out of its sandbox.
10) Cleartext storage of sensitive information (CVE-ID: CVE-2023-32386)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to Contacts application stores potentially sensitive data in temporary files. A local application can observe unprotected user data.
11) Information disclosure (CVE-ID: CVE-2023-32399)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to incorrect handling of caches in Core Location. A local application can read sensitive location information.
12) Cleartext storage of sensitive information (CVE-ID: CVE-2023-28191)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to CoreServices stores potentially sensitive data in in insecure manner. A local application can bypass Privacy preferences.
13) Improper Authentication (CVE-ID: CVE-2023-32360)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to missing authentication in CUPS. A remote attacker can access recently printed documents.
14) Use-after-free (CVE-ID: CVE-2023-32387)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in dcerpc daemon. A remote attacker can send a specially crafted request to the affected daemon, trigger a use-after-free error and execute arbitrary code on the system..
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
15) Improper Privilege Management (CVE-ID: CVE-2023-32414)
The vulnerability allows a local application to escalate privileges.
The vulnerability exists due to improper privilege management in DesktopServices. A local application can break out of its sandbox.
16) Cleartext storage of sensitive information (CVE-ID: CVE-2023-32392)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to GeoServices application stores potentially sensitive data in log files. A local application can read sensitive location information.
17) Buffer overflow (CVE-ID: CVE-2023-32384)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in ImageIO. A remote attacker can create a specially crafted EXR file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
18) Out-of-bounds read (CVE-ID: CVE-2023-32375)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition when processing 3D models within the Hydra framework. A remote attacker can create a specially crafted USD file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.
19) Out-of-bounds read (CVE-ID: CVE-2023-32410)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in IOSurface. A local application can trigger an out-of-bounds read error and read contents of kernel memory.
20) Out-of-bounds read (CVE-ID: CVE-2023-32420)
The vulnerability allows a local application to gain access to potentially sensitive information or crash the kernel.
The vulnerability exists due to a boundary condition in IOSurfaceAccelerator. A local application can trigger an out-of-bounds read error and read contents of kernel memory or crash the system.
21) Type Confusion (CVE-ID: CVE-2023-27930)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a type confusion error in OS kernel. A local user can trigger a type confusion error and execute arbitrary code with kernel privileges.
22) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-27940)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improperly imposed security restrictions within the OS kernel. A local application can observe system-wide network connections.
23) Use-after-free (CVE-ID: CVE-2023-32398)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the OS kernel. A local user can trigger a use-after-free error and execute arbitrary code with root privileges.
24) Race condition (CVE-ID: CVE-2023-32413)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the /dev/fd filesystem. A local user can exploit the race and execute arbitrary code with root privileges.
25) Security features bypass (CVE-ID: CVE-2023-32352)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to a logic error in LaunchServices. A local application can bypass Gatekeeper checks.
26) Improper Privilege Management (CVE-ID: CVE-2023-32369)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improper privilege management in libxpc. A local application can modify protected parts of the file system.
27) Improper Privilege Management (CVE-ID: CVE-2023-32405)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper privilege management in libxpc. A local application can execute arbitrary code with root privileges.
28) Improper Privilege Management (CVE-ID: CVE-2023-32407)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improper privilege management in Metal. A local application can bypass Privacy preferences.
29) Out-of-bounds read (CVE-ID: CVE-2023-32368)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition when processing 3D models in Model I/O. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.
30) Out-of-bounds write (CVE-ID: CVE-2023-32380)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing 3D models in Model I/O. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
31) Cleartext storage of sensitive information (CVE-ID: CVE-2023-32403)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to NetworkExtension stores potentially sensitive data in files. A local application can read sensitive location information.
32) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-32355)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in PackageKit. A local application can modify protected parts of the file system.
33) Buffer overflow (CVE-ID: CVE-2023-32385)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in PDFKit. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and crash the application.
34) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-32395)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in Perl. A local application can modify protected parts of the file system.
35) Improper Privilege Management (CVE-ID: CVE-2023-32390)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improper privilege management in Photos. A local application can view photos belonging to the Hidden Photos Album through Visual Lookup.
36) Improper Authorization (CVE-ID: CVE-2023-32357)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improper authorization in Sandbox. A local application can retain access to system configuration files even after its permission is revoked.
37) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-32363)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in Screen Saver. A local application can bypass Privacy preferences.
38) Information disclosure (CVE-ID: CVE-2023-32367)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to an error in Security component. A local application can access user-sensitive data.
39) Improper Privilege Management (CVE-ID: CVE-2023-32397)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improper privilege management in the Shell component. A local local application can modify protected parts of the file system.
40) Insufficient UI Warning of Dangerous Operations (CVE-ID: CVE-2023-32391)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists in the Shortcuts component. A remote attacker can trick the victim into clocking on a malicious shortcut and use sensitive data with certain actions without prompting the user.
41) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-32404)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in Shortcuts. A local application can bypass Privacy preferences.
42) Security features bypass (CVE-ID: CVE-2023-32394)
The vulnerability allows an attacker to gain access to sensitive information.
The vulnerability exists due to unspecified vulnerability in Siri. An attacker with physical access to a device can view contact information from the lock screen.
43) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2023-32422)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to SQLite stores sensitive information into log files. A local application can access data from other apps by enabling additional SQLite logging.
44) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-32376)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in StorageKit. A local application can modify protected parts of the file system.
45) State Issues (CVE-ID: CVE-2023-28202)
The vulnerability may allow local application to bypass implemented security issues.
The vulnerability exists due to state management issue in System Settings. An app firewall setting may not take effect after exiting the Settings app.
46) Use-after-free (CVE-ID: CVE-2023-32412)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Telephony service. A remote attacker can trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
47) Information disclosure (CVE-ID: CVE-2023-32408)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to improper handling of caches in TV App. A local application can read sensitive location information.
48) Information disclosure (CVE-ID: CVE-2023-32415)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the Weather application. A local application can read sensitive location information.
49) Out-of-bounds read (CVE-ID: CVE-2023-32402)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in WebKit. A remote attacker can trick the victim to open a specially crafted website. trigger an out-of-bounds read error and read contents of memory on the system.
50) Buffer overflow (CVE-ID: CVE-2023-32423)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
51) Information disclosure (CVE-ID: CVE-2023-32389)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the Wi-Fi component. A local application can disclose kernel memory.
52) Information disclosure (CVE-ID: CVE-2023-32432)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists in Share Sheet write sensitive information into temporary files. A local application can gain unauthorized access to sensitive information.
53) Buffer overflow (CVE-ID: CVE-2023-32379)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in AMD support. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
54) Improper Privilege Management (CVE-ID: CVE-2023-34352)
The vulnerability allows a local user to gain access to sensitive information.
55) Input validation error (CVE-ID: CVE-2023-32428)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of files within the MallocStackLogging component. A local application can execute arbitrary code with root privileges.
56) Input validation error (CVE-ID: CVE-2023-22809)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists within the sudoedit (aka -e) feature due to insufficient validation of user-supplied input passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR). The problem exists because a user-specified editor may contain a "--"
argument that defeats a protection mechanism, e.g., an EDITOR='vim --
/path/to/extra/file' value. A local user can append arbitrary entries to the list of files to process and escalate privileges on the system.
57) Improper access control (CVE-ID: CVE-2023-32417)
The vulnerability allows an attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in Face Gallery. A attacker with physical access to a locked Apple Watch can view user photos or contacts via accessibility features.
58) Security features bypass (CVE-ID: CVE-2023-32437)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improper handling of a file protocol in NSURLSession. A local application can break out of its sandbox.
59) Code Injection (CVE-ID: CVE-2023-32383)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper input validation in AppleMobileFileIntegrity. A local application can inject code into sensitive binaries bundled with Xcode.
60) Resource management error (CVE-ID: CVE-2023-29469)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources when working with hashes of empty dict strings. A remote attacker can and perform a denial of service (DoS) attack.
61) NULL pointer dereference (CVE-ID: CVE-2023-42869)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in xmlSchemaCheckCOSSTDerivedOK. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
62) Buffer overflow (CVE-ID: CVE-2023-32401)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Quick Look. A remote attacker can create a specially crafted document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
63) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-42958)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to MobileStorageMounter does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.
Remediation
Install update from vendor's website.