SB2019012302 - Multiple vulnerabilities in Apple macOS
Published: January 23, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 23 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2019-6235)
The vulnerability allows a remote attacker to bypass security restrictions.The weakness exists due to a boundary error in the AppleKeyStore component when handling malicious input. A remote attacker can trigger memory corruption to circumvent sandbox restrictions.
2) Out-of-bounds read (CVE-ID: CVE-2019-6200)
The vulnerability allows a remote authenticated attacker to cause DoS condition.The weakness exists due to out-of-bounds read in the Bluetooth component when handling malicious input. A remote authenticated attacker can supply specially crafted input and cause the service to crash.
3) Out-of-bounds read (CVE-ID: CVE-2019-6202)
The vulnerability allows a local authenticated attacker to gain elevated privileges.The weakness exists due to out-of-bounds read in the Core Media component when handling malicious input. A local authenticated attacker can run a specially crafted application and gain elevated privileges.
4) Out-of-bounds read (CVE-ID: CVE-2019-6221)
The vulnerability allows a local authenticated attacker to gain elevated privileges.The weakness exists due to out-of-bounds read in the Core Media component when handling malicious input. A local authenticated attacker can run a specially crafted application and gain elevated privileges.
5) Out-of-bounds read (CVE-ID: CVE-2019-6231)
The vulnerability allows a local authenticated attacker to obtain potentially sensitive information.The weakness exists due to out-of-bounds read in the CoreAnimation component when handling malicious input. A local authenticated attacker can run a specially crafted application and access arbitrary data.
6) Memory corruption (CVE-ID: CVE-2019-6230)
The vulnerability allows a local authenticated attacker to bypass security restrictions.The weakness exists due to a boundary error in the CoreAnimation component when handling malicious input. A local attacker can run a specially crafted application, trigger memory corruption and circumvent sandbox restrictions.
7) Buffer overflow (CVE-ID: CVE-2019-6224)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to a boundary error in the FaceTime component when handling malicious input. A remote attacker can initiate a FaceTime call, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
8) Type confusion (CVE-ID: CVE-2019-6214)
The vulnerability allows a local authenticated attacker to bypass security restrictions.The weakness exists due to a boundary error in the IOKit component when handling malicious input. A local attacker can run a specially crafted application, trigger type confusion error and circumvent sandbox restrictions.
9) Memory corruption (CVE-ID: CVE-2019-6225)
The vulnerability allows a local authenticated attacker to gain elevated privileges.The weakness exists due to a boundary error in the Kernel component when handling malicious input. A local authenticated attacker can run a specially crafted application, trigger memory corruption and gain elevated privileges.
10) Privilege escalation (CVE-ID: CVE-2019-6210)
The vulnerability allows a local authenticated attacker to gain elevated privileges.The weakness exists due to an error in the Kernel component when handling malicious input. A local authenticated attacker can run a specially crafted application and execute arbitrary code with kernel privileges.
Successful exploitation of the vulnerability may result in system compromise.
11) Memory corruption (CVE-ID: CVE-2019-6205)
The vulnerability allows a local authenticated attacker to bypass security restrictions.The weakness exists due to lock state checking in the Kernel component when handling malicious input. A local authenticated attacker can run a specially crafted application, trigger memory corruption and cause unexpected changes in memory shared between processes.
12) Buffer overflow (CVE-ID: CVE-2019-6213)
The vulnerability allows a local authenticated attacker to gain elevated privileges.The weakness exists due to a boundary error in the Kernel component when handling malicious input. A local authenticated attacker can run a specially crafted application, trigger buffer overflow and execute arbitrary code with kernel privileges.
Successful exploitation of the vulnerability may result in system compromise.
13) Out-of-bounds read (CVE-ID: CVE-2019-6209)
The vulnerability allows a local authenticated attacker to obtain potentially sensitive information.The weakness exists due to out-of-bounds read in the Kernel component when handling malicious input. A local authenticated attacker can run a specially crafted application and determine kernel memory layout.
14) Memory corruption (CVE-ID: CVE-2019-6208)
The vulnerability allows a local authenticated attacker to bypass security restrictions.The weakness exists due to lock state checking in the Kernel component when handling malicious input. A local authenticated attacker can run a specially crafted application, trigger memory corruption and cause unexpected changes in memory shared between processes.
15) Memory corruption (CVE-ID: CVE-2019-6218)
The vulnerability allows a local authenticated attacker to gain elevated privileges.The weakness exists due to a boundary error in the Kernel component when handling malicious input. A local authenticated attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with kernel privileges.
Successful exploitation of the vulnerability may result in system compromise.
16) Input validation error (CVE-ID: CVE-2019-6219)
The vulnerability allows a remote attacker to bypass security restrictions.The weakness exists due to an error in the Natural Language Processing component when handling malicious input. A remote attacker can trick the victim into processing a specially crafted message and cause the service to crash.
17) Memory corruption (CVE-ID: CVE-2019-6211)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to a boundary error in the WebRTC component when handling malicious input. A remote attacker can trick the victim into processing a specially crafted content, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
18) SQL injection (CVE-ID: CVE-2018-20346)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the SQLite component. A remote attacker can send a specially specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
19) SQL injection (CVE-ID: CVE-2018-20506)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the SQLite component. A remote attacker can send a specially specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
20) SQL injection (CVE-ID: CVE-2018-20505)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the SQLite component. A remote attacker can send a specially specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
21) Memory corruption (CVE-ID: CVE-2018-4467)
The vulnerability allows a local authenticated attacker to gain elevated privileges.The weakness exists due to a boundary error in the Hypervisor component when handling malicious input. A local authenticated attacker can run a specially crafted application, trigger memory corruption and gain elevated privileges.
22) Memory corruption (CVE-ID: CVE-2018-4452)
The vulnerability allows a local authenticated attacker to gain elevated privileges.The weakness exists due to a boundary error in the Intel Graphics Driver component when handling malicious input. A local authenticated attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with system privileges.
Successful exploitation of the vulnerability may result in system compromise.
23) Out-of-bounds read (CVE-ID: CVE-2019-6220)
The vulnerability allows a local authenticated attacker to obtain potentially sensitive information.The weakness exists due to out-of-bounds read in the QuartzCore component when handling malicious input. A local authenticated attacker can run a specially crafted application and rear restricted memory.
Remediation
Install update from vendor's website.