SB2018092403 - Multiple vulnerabilities in Apple MacOS



SB2018092403 - Multiple vulnerabilities in Apple MacOS

Published: September 24, 2018 Updated: October 25, 2018

Security Bulletin ID SB2018092403
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Out-of-bounds read (CVE-ID: CVE-2018-4338)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists on systems with Wi-Fi is enabled due to stack value by OOB Read is stored in the ol_nd_hostip variable when the setOFFLOAD_NDP function does not check the input value. A local attacker can use the dlsym function to /System/Library/PrivateFrameworks/Apple80211.framework/Apple80211, which yields Apple80211Open, Apple80211BindToInterface, and Apple80211Close functions, trigger out-of-bounds read and obtain a kernel address for privilege escalation in the Apple OS X local environment.



2) Information disclosure (CVE-ID: CVE-2018-4324)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to insufficient permissions and access controls when handling the Apple ID. A local attacker can run a specially crafted application and determine the Apple ID of the owner of the computer.

3) Information disclosure (CVE-ID: CVE-2018-4321)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to improper validation of the process entitlement. A local attacker can run a specially crafted application and access local users AppleIDs.

4) Information disclosure (CVE-ID: CVE-2018-4333)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to improper validation of user-supplied input. A local attacker can run a specially crafted application and read restricted memory.

5) Security restrictions bypass (CVE-ID: CVE-2018-4353)

The vulnerability allows a local attacker to bypass security restrictions on the target system.

The weakness exists due to improper sandbox restrictions. A local attacker can run a specially crafted application and circumvent sandbox restrictions.

6) Memory corruption (CVE-ID: CVE-2018-4336)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper sandbox restrictions when handling malicious input. A local attacker can run a specially crafted application and execute arbitrary code with kernel privileges.

7) Memory corruption (CVE-ID: CVE-2018-4344)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper sandbox restrictions when handling malicious input. A local attacker can run a specially crafted application and execute arbitrary code with kernel privileges.

Remediation

Install update from vendor's website.