SB2022102439 - Multiple vulnerabilities in Apple macOS Big Sur
Published: October 24, 2022 Updated: May 15, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42825)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions within the AppleMobileFileIntegrity. A local application can modify protected parts of the filesystem.
2) Type conversion (CVE-ID: CVE-2022-28739)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a type conversion error in some convertion methods like Kernel#Float</code> and <code>String#to_f. A remote attacker can pass specially crafted data to the affected application, trigger memory corruption and execute arbitrary code in the system.
3) Security features bypass (CVE-ID: CVE-2022-32862)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in Sandbox. A local application can gain unauthorized access to sensitive information.
4) Buffer overflow (CVE-ID: CVE-2022-32941)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within ppp implementation. A remote attacker can trick the victim into connecting to a malicious PPP server, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Buffer overflow (CVE-ID: CVE-2022-32944)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
6) Heap-based buffer overflow (CVE-ID: CVE-2022-37434)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a large gzip header within inflateGetHeader in inflate.c. A remote attacker can pass a specially crafted file to the affected application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
7) Out-of-bounds read (CVE-ID: CVE-2022-42798)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition when parsing media files in the Audio subsystem. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and gain access to sensitive information.
8) Heap-based buffer overflow (CVE-ID: CVE-2022-42800)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing gzip files. A remote attacker can pass a specially crafted file to the affected application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
9) Race condition (CVE-ID: CVE-2022-46713)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition in PackageKit. A local application can exploit the race and modify protected parts of the file system.
10) External Control of File Name or Path (CVE-ID: CVE-2022-46723)
The vulnerability allows a remote attacker to write arbitrary files to the system.
The vulnerability exists due to improper input validation in the Calendar. A remote attacker can write arbitrary files to the victim's system.
11) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42860)
The vulnerability allows a malicious application to bypass implemented security restrictions.
The vulnerability exists due to Boot Camp does not properly impose security restrictions. A local application can modify protected parts of the file system.
Remediation
Install update from vendor's website.