SB2023012334 - Multiple vulnerabilities in Apple macOS Big Sur



SB2023012334 - Multiple vulnerabilities in Apple macOS Big Sur

Published: January 23, 2023 Updated: May 15, 2023

Security Bulletin ID SB2023012334
Severity
High
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 27% Medium 9% Low 64%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2023-23499)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in AppleMobileFileIntegrity. A local application can gain access to sensitive user information.


2) Input validation error (CVE-ID: CVE-2022-35252)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the way curl handles cookies with control codes (byte values below 32). When cookies that contain such control codes are later sent back to an HTTP(S) server, it might make the server return a 400 response, effectively allowing a "sister site" to deny service to siblings.


3) Buffer overflow (CVE-ID: CVE-2023-23513)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in dcerpc when mounting a malicious SMB share. A remote attacker can trick the victim to mount a malicious SMB share, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Improper Privilege Management (CVE-ID: CVE-2023-23497)

The vulnerability allows a local application to escalate privileges.

The vulnerability exists due to improper privilege management in PackageKit. A local application can execute arbitrary code with root privileges.


5) Information disclosure (CVE-ID: CVE-2023-23505)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a privacy issue in Screen Time. A local application can gain unauthorized access to user's contact information.


6) Buffer overflow (CVE-ID: CVE-2023-23518)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Buffer overflow (CVE-ID: CVE-2023-23517)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Security features bypass (CVE-ID: CVE-2023-23508)

The vulnerability allows a local application to bypass certain security restrictions.

The vulnerability exists due to an error within Windows Installer. A local application can bypass Privacy preferences.


9) Improper access control (CVE-ID: CVE-2022-42834)

The vulnerability allows a local application to gain unauthorized access to sensitive information.

The vulnerability exists due to improper access restrictions in Mail. A local application can gain unauthorized access to mail folder attachments through a temporary directory used during compression.


10) Buffer overflow (CVE-ID: CVE-2023-23516)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.


11) Improper access control (CVE-ID: CVE-2023-27931)

The vulnerability allows a local application to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in AppleMobileFileIntegrity. A local application can gain access to user-sensitive data.


Remediation

Install update from vendor's website.