SB2018092403 - Multiple vulnerabilities in Apple MacOS
Published: September 24, 2018 Updated: October 25, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2018-4338)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists on systems with Wi-Fi is enabled due to stack value by OOB Read is stored in the
ol_nd_hostip variable when the setOFFLOAD_NDP function does not check the input value. A local attacker can use the dlsym function to /System/Library/PrivateFrameworks/Apple80211.framework/Apple80211, which yields Apple80211Open, Apple80211BindToInterface, and Apple80211Close functions, trigger out-of-bounds read and obtain a kernel address for privilege escalation in the Apple OS X local environment.2) Information disclosure (CVE-ID: CVE-2018-4324)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to insufficient permissions and access controls when handling the Apple ID. A local attacker can run a specially crafted application and determine the Apple ID of the owner of the computer.
3) Information disclosure (CVE-ID: CVE-2018-4321)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper validation of the process entitlement. A local attacker can run a specially crafted application and access local users AppleIDs.
4) Information disclosure (CVE-ID: CVE-2018-4333)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper validation of user-supplied input. A local attacker can run a specially crafted application and read restricted memory.
5) Security restrictions bypass (CVE-ID: CVE-2018-4353)
The vulnerability allows a local attacker to bypass security restrictions on the target system.The weakness exists due to improper sandbox restrictions. A local attacker can run a specially crafted application and circumvent sandbox restrictions.
6) Memory corruption (CVE-ID: CVE-2018-4336)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to improper sandbox restrictions when handling malicious input. A local attacker can run a specially crafted application and execute arbitrary code with kernel privileges.
7) Memory corruption (CVE-ID: CVE-2018-4344)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to improper sandbox restrictions when handling malicious input. A local attacker can run a specially crafted application and execute arbitrary code with kernel privileges.
Remediation
Install update from vendor's website.