SB2023051902 - Multiple vulnerabilities in Apple macOS Big Sur 



SB2023051902 - Multiple vulnerabilities in Apple macOS Big Sur

Published: May 19, 2023 Updated: November 22, 2024

Security Bulletin ID SB2023051902
Severity
High
Patch available
YES
Number of vulnerabilities 27
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 19% Medium 7% Low 74%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 27 secuirty vulnerabilities.


1) Security features bypass (CVE-ID: CVE-2023-32352)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to a logic error in LaunchServices. A local application can bypass Gatekeeper checks.


2) Use-after-free (CVE-ID: CVE-2023-32412)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in Telephony service. A remote attacker can trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


3) Improper Privilege Management (CVE-ID: CVE-2023-32397)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improper privilege management in the Shell component. A local local application can modify protected parts of the file system.


4) Improper Authorization (CVE-ID: CVE-2023-32357)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improper authorization in Sandbox. A local application can retain access to system configuration files even after its permission is revoked.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-32395)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improperly imposed security restrictions in Perl. A local application can modify protected parts of the file system.


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-32355)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improperly imposed security restrictions in PackageKit. A local application can modify protected parts of the file system.


7) Cleartext storage of sensitive information (CVE-ID: CVE-2023-32403)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to NetworkExtension stores potentially sensitive data in files. A local application can read sensitive location information.


8) Out-of-bounds read (CVE-ID: CVE-2023-32382)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when processing 3D models in Model I/O. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


9) Out-of-bounds write (CVE-ID: CVE-2023-32380)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing 3D models in Model I/O. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


10) Improper Privilege Management (CVE-ID: CVE-2023-32407)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improper privilege management in Metal. A local application can bypass Privacy preferences.


11) Improper Privilege Management (CVE-ID: CVE-2023-32405)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper privilege management in libxpc. A local application can execute arbitrary code with root privileges.


12) Improper Privilege Management (CVE-ID: CVE-2023-32369)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improper privilege management in libxpc. A local application can modify protected parts of the file system.


13) Use-after-free (CVE-ID: CVE-2023-32398)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the OS kernel. A local user can trigger a use-after-free error and execute arbitrary code with root privileges.


14) Security features bypass (CVE-ID: CVE-2023-32388)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to a privacy issue when writing data to log entries in Accessibility component. A local application can bypass Privacy preferences.


15) Race condition (CVE-ID: CVE-2023-32413)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the /dev/fd filesystem. A local user can exploit the race and execute arbitrary code with root privileges.


16) Out-of-bounds read (CVE-ID: CVE-2023-32410)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in IOSurface. A local application can trigger an out-of-bounds read error and read contents of kernel memory.


17) Buffer overflow (CVE-ID: CVE-2023-32384)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in ImageIO. A remote attacker can create a specially crafted EXR file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


18) Cleartext storage of sensitive information (CVE-ID: CVE-2023-32392)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to GeoServices application stores potentially sensitive data in log files. A local application can read sensitive location information.


19) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-27945)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper handling of permissions in Dev Tools component of Xcode. A local sandboxed application can collect system logs.


20) Use-after-free (CVE-ID: CVE-2023-32387)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in dcerpc daemon. A remote attacker can send a specially crafted request to the affected daemon, trigger a use-after-free error and execute arbitrary code on the system..

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


21) Improper Authentication (CVE-ID: CVE-2023-32360)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to missing authentication in CUPS. A remote attacker can access recently printed documents.


22) Buffer overflow (CVE-ID: CVE-2023-28181)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in CoreCapture. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.


23) Cleartext storage of sensitive information (CVE-ID: CVE-2023-32386)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to Contacts application stores potentially sensitive data in temporary files. A local application can observe unprotected user data.


24) Improper Privilege Management (CVE-ID: CVE-2023-32411)

The vulnerability allows a local application to escalate privileges.

The vulnerability exists due to improper privilege management in AppleMobileFileIntegrity. A local application can bypass Privacy preferences.


25) Cleartext storage of sensitive information (CVE-ID: CVE-2023-28191)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to CoreServices stores potentially sensitive data in in insecure manner. A local application can bypass Privacy preferences.


26) Code Injection (CVE-ID: CVE-2023-32383)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper input validation in AppleMobileFileIntegrity. A local application can inject code into sensitive binaries bundled with Xcode.


27) Buffer overflow (CVE-ID: CVE-2023-32401)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Quick Look. A remote attacker can create a specially crafted document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.