SB2023012334 - Multiple vulnerabilities in Apple macOS Big Sur
Published: January 23, 2023 Updated: May 15, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2023-23499)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper access restrictions in AppleMobileFileIntegrity. A local application can gain access to sensitive user information.
2) Input validation error (CVE-ID: CVE-2022-35252)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the way curl handles cookies with control codes (byte values below 32). When cookies that contain such control codes are later sent back to an
HTTP(S) server, it might make the server return a 400 response, effectively allowing a "sister site" to deny service to siblings.
3) Buffer overflow (CVE-ID: CVE-2023-23513)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in dcerpc when mounting a malicious SMB share. A remote attacker can trick the victim to mount a malicious SMB share, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Improper Privilege Management (CVE-ID: CVE-2023-23497)
The vulnerability allows a local application to escalate privileges.
The vulnerability exists due to improper privilege management in PackageKit. A local application can execute arbitrary code with root privileges.
5) Information disclosure (CVE-ID: CVE-2023-23505)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to a privacy issue in Screen Time. A local application can gain unauthorized access to user's contact information.
6) Buffer overflow (CVE-ID: CVE-2023-23518)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Buffer overflow (CVE-ID: CVE-2023-23517)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
8) Security features bypass (CVE-ID: CVE-2023-23508)
The vulnerability allows a local application to bypass certain security restrictions.
The vulnerability exists due to an error within Windows Installer. A local application can bypass Privacy preferences.
9) Improper access control (CVE-ID: CVE-2022-42834)
The vulnerability allows a local application to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions in Mail. A local application can gain unauthorized access to mail folder attachments through a temporary directory used during compression.
10) Buffer overflow (CVE-ID: CVE-2023-23516)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
11) Improper access control (CVE-ID: CVE-2023-27931)
The vulnerability allows a local application to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in AppleMobileFileIntegrity. A local application can gain access to user-sensitive data.
Remediation
Install update from vendor's website.