SB2022102521 - Multiple vulnerabilities in Apple macOS Ventura
Published: October 25, 2022 Updated: June 4, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 157 secuirty vulnerabilities.
1) Use of out-of-range pointer offset (CVE-ID: CVE-2022-0554)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a boundary error when reading files. A remote attacker can trick the victim to open a specially crafted file and crash the application.
2) Heap-based buffer overflow (CVE-ID: CVE-2022-1616)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open a specially crafted file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) NULL pointer dereference (CVE-ID: CVE-2022-1725)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trick the victim to open a specially crafted file and perform a denial of service (DoS) attack.
4) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2022-1420)
The vulnerability allows a remote attacker to cause a denial of service on the target application.
The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open a specially crafted file, trigger a use of out-of-range pointer offset and crash the application.
5) Out-of-bounds write (CVE-ID: CVE-2022-1381)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
6) Heap-based buffer overflow (CVE-ID: CVE-2022-0943)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open a specially crafted file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Buffer overflow (CVE-ID: CVE-2022-0729)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing files. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
8) Heap-based buffer overflow (CVE-ID: CVE-2022-0714)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open a specially crafted file, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
9) NULL pointer dereference (CVE-ID: CVE-2022-0696)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in Vim when switching tabpage while in the cmdline window. A remote attacker can perform a denial of service (DoS) attack.
10) Use of out-of-range pointer offset (CVE-ID: CVE-2022-0685)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to improper input validation when processing special multi-byte characters. A remote attacker can trick the victim to open a specially crafted file and crash the application.
11) Stack-based buffer overflow (CVE-ID: CVE-2022-0629)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when using many composing characters in error message. A remote unauthenticated attacker can trick the victim to open a specially crafted file, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
12) Heap-based buffer overflow (CVE-ID: CVE-2022-0572)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when repeatedly using :retab. A remote attacker can trick the victim to open a specially crafted file, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
13) Heap-based buffer overflow (CVE-ID: CVE-2022-0392)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open a specially crafted file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
14) NULL pointer dereference (CVE-ID: CVE-2022-1620)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the vim_regexec_string() function in regexp.c. A remote attacker can trick the victim to open a specially crafted file, trigger NULL pointer dereference error and crash the application.
15) Out-of-bounds read (CVE-ID: CVE-2022-0368)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
16) Heap-based buffer overflow (CVE-ID: CVE-2022-0361)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when copying lines in Visual mode. A remote attacker can trick the victim to open a specially crafted file, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
17) Heap-based buffer overflow (CVE-ID: CVE-2022-0359)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open a specially crafted file, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
18) Buffer overflow (CVE-ID: CVE-2022-0351)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing files. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
19) Out-of-bounds read (CVE-ID: CVE-2022-0319)
The vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
20) Heap-based buffer overflow (CVE-ID: CVE-2022-0318)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open a specially crafted file, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
21) Heap-based buffer overflow (CVE-ID: CVE-2022-0261)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open a specially crafted file, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
22) Buffer overflow (CVE-ID: CVE-2021-36690)
The vulnerability allows a local user to perform a denial of service attack.
The vulnerability exists due to a segmentation fault in the sqlite3 command-line component when processing SQL queries in the idxGetTableInfo() function. A local user can pass a specially crafted SQL query and crash the application.
23) Race condition (CVE-ID: CVE-2022-42791)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition within the Software Update component. A local application can exploit the race and execute arbitrary code with kernel privileges.
24) Buffer overflow (CVE-ID: CVE-2022-32934)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in SMB subsystem. A remote attacker can trick the victim to open a specially crafted file from an external SMB share, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
25) Security features bypass (CVE-ID: CVE-2022-32870)
The vulnerability allows an attacker to gain access to sensitive information.
The
vulnerability exists due to a logic issue in Siri. An attacker
with physical access to device can obtain certain call history information.
26) Heap-based buffer overflow (CVE-ID: CVE-2022-1619)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing data in the cmdline_erase_chars() function in ex_getln.c. A remote attacker can trick the victim to open a specially crafted file, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
27) Heap-based buffer overflow (CVE-ID: CVE-2022-1621)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can trick the victim to open a specially crafted file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
28) Information disclosure (CVE-ID: CVE-2022-32938)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists in the way Shortcuts handle directory paths. A shortcut may be able to check the existence of an arbitrary path on the file system.
29) Out-of-bounds read (CVE-ID: CVE-2022-2124)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in textobject.c. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
30) Security features bypass (CVE-ID: CVE-2022-32892)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to improper access restrictions within WebKit Sandboxing. A remote attacker can trick the victim into visiting a specially crafted website and bypass implemented sandbox restrictions on the browser process.
31) Buffer overflow (CVE-ID: CVE-2022-32922)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing PDf files in WebKit PDF. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
32) Information disclosure (CVE-ID: CVE-2022-42824)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to unspecified error in WebKit. A remote attacker can trick the victim to visit a specially crafted web page and gain access to potentially sensitive information.
33) Type Confusion (CVE-ID: CVE-2022-42823)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a type confusion error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a type confusion error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
34) Spoofing attack (CVE-ID: CVE-2022-42799)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in WebKit. A remote attacker can trick the victim to visit a specially crafted website and spoof user interface.
35) Out-of-bounds read (CVE-ID: CVE-2022-32912)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it using the affected software, trigger out-of-bounds read and execute arbitrary code on the target system.
36) Out-of-bounds write (CVE-ID: CVE-2022-32888)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
37) Buffer overflow (CVE-ID: CVE-2022-32886)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing web content in WebKit. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
38) Information disclosure (CVE-ID: CVE-2022-32875)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in the Weather app. A local application can gain unauthorized access to location information.
39) Out-of-bounds read (CVE-ID: CVE-2022-2126)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in spellsuggest.c. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
40) Heap-based buffer overflow (CVE-ID: CVE-2022-2125)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in indent.c. A remote attacker can trick the victim to open a specially crafted file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
41) Use-after-free (CVE-ID: CVE-2022-2042)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in spell.c. A remote attacker can trick the victim to open a specially crafted file, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
42) Out-of-bounds read (CVE-ID: CVE-2022-1629)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a boundary condition in find_next_quote() function. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error, perform a denial of service attack, modify memory, and execute arbitrary code.
43) Out-of-bounds write (CVE-ID: CVE-2022-2000)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in ex_docmd.c. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
44) Out-of-bounds read (CVE-ID: CVE-2022-1720)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in normal.c. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
45) Use-after-free (CVE-ID: CVE-2022-1898)
The vulnerability allows a local attacker to execute arbitrary code on the system.
The vulnerability exists due to Illegal memory access and leads to a use-after-free vulnerability in the find_pattern_in_path() function. A local attacker can trick the victim into opening a specially crafted file, leading to a system crash or code execution.
46) Out-of-bounds write (CVE-ID: CVE-2022-1897)
The vulnerability allows a local attacker to execute arbitrary code on the system.
The vulnerability exists due to Illegal memory access and leads to an out-of-bounds write vulnerability in the vim_regsub_both() function. A local attacker can trick the victim into opening a specially crafted file, leading to a system crash or code execution.
47) Out-of-bounds read (CVE-ID: CVE-2022-1851)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to illegal memory access and leads to an out-of-bounds read vulnerability in the gchar_cursor() function. A local attacker can trick the victim into opening a specially crafted file, leading to a system crash or code execution.
48) Use-after-free (CVE-ID: CVE-2022-1968)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in search.c. A remote attacker can trick the victim to open a specially crafted file, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
49) Heap-based buffer overflow (CVE-ID: CVE-2022-1942)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in buffer.c. A remote attacker can trick the victim to open a specially crafted file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
50) Out-of-bounds read (CVE-ID: CVE-2022-1927)
The vulnerability allows a local attacker to execute arbitrary code on the system.
The vulnerability exists due to Illegal memory access and leads to a buffer over-read vulnerability in the utf_ptr2char() function. A local attacker can trick the victim into opening a specially crafted file, trigger out-of-bounds read error and execute arbitrary code on the system.
51) Out-of-bounds read (CVE-ID: CVE-2022-1769)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in get_one_sourceline() function. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
52) Buffer overflow (CVE-ID: CVE-2022-1735)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in utfc_ptr2len() function. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
53) Heap-based buffer overflow (CVE-ID: CVE-2022-1733)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in skip_string() function. A remote attacker can trick the victim to open a specially crafted file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
54) NULL pointer dereference (CVE-ID: CVE-2022-1674)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trick the victim to open a specially crafted file and perform a denial of service attack.
55) Security features bypass (CVE-ID: CVE-2022-42790)
The vulnerability allows an attacker to gain access to sensitive information.
The vulnerability exists due to a logic issue in the Sidecar. An attacker with physical access to device can view restricted content from the lock screen.
56) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2022-42793)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to incorrect verification of cryptographic signature within the Security component. A remote attacker can trick the victim into running a malicious app that appears to have a valid signature and compromise the affected system.
57) Buffer overflow (CVE-ID: CVE-2022-42795)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Accelerate Framework. A remote attacker can create a specially crafted image file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
58) Buffer overflow (CVE-ID: CVE-2022-26730)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in ColorSync when processing ICC profiles. A remote attacker can create a specially crafted image, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
59) UNIX symbolic link following (CVE-ID: CVE-2022-32905)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a symlink following issue when handling DWG files in Finder. A local application can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
Successful exploitation of this vulnerability may result in privilege escalation.
60) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42788)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to Find My does not properly impose security restrictions. A malicious application installed on the system can obtain location information.
61) Man-in-the-Middle (MitM) attack (CVE-ID: CVE-2022-32928)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to a logic error within the Exchange app. A remote attacker on the local network can intercept mail credentials.
62) Type Confusion (CVE-ID: CVE-2022-32915)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a type confusion error in DriverKit. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
63) Buffer overflow (CVE-ID: CVE-2022-32865)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in DriverKit. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
64) Information disclosure (CVE-ID: CVE-2022-42814)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the Directory Utility. A local application can gain unauthorized access to sensitive information on the system.
65) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2022-32208)
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to improper handling of message verification failures when performing FTP transfers secured by krb5. A remote attacker can perform MitM attack and manipulate data.
66) Incorrect default permissions (CVE-ID: CVE-2022-32207)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to incorrect default permissions set to cookies, alt-svc and hsts data stored in local files. A local user with ability to read such files can gain access to potentially sensitive information.
67) Resource exhaustion (CVE-ID: CVE-2022-32206)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insecure processing of compressed HTTP responses. A malicious server can send a specially crafted HTTP response to curl and perform a denial of service attack by forcing curl to spend enormous amounts of allocated heap memory, or trying to and returning out of memory errors.
68) Resource exhaustion (CVE-ID: CVE-2022-32205)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to curl does not impose limits to the size of cookies stored in the system. A malicious server can serve excessive amounts of Set-Cookie: headers in a HTTP response to curl and consume all available disk space.
69) Improper access control (CVE-ID: CVE-2022-32867)
The vulnerability allows a local attacker to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions in Crash Reporter. An attacker with physical access to device can read data past diagnostic logs.
70) Improper Certificate Validation (CVE-ID: CVE-2022-42813)
The vulnerability allows a remote attacker to perform MitM attacks.
The vulnerability exists due to improper certificate validation when handling WKWebView in CFNetwork. A remote attacker can forge a digital certificate, perform MitM attack and compromise the affected system.
71) Buffer overflow (CVE-ID: CVE-2022-42809)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing .gcx files in Grapher. A remote attacker can create a specially crafted .gcx file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
72) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42819)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improperly imposed security restrictions in Calendar. A local application can gain access to sensitive information.
73) Buffer overflow (CVE-ID: CVE-2022-32940)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within AVEVideoEncoder. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
74) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42796)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due within the Audio subsystem. A local application can escalate privileges on the system.
75) Security features bypass (CVE-ID: CVE-2022-32890)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to incorrectly imposed security restrictions in ATS. A sandboxed process can bypass implemented restrictions.76) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-32904)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to incorrectly imposed security restrictions in ATS. A local application can gain access to sensitive user information.77) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-32902)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to a logic error in ATS. A local application can bypass Privacy preferences.
78) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42825)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions within the AppleMobileFileIntegrity. A local application can modify protected parts of the filesystem.
79) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42789)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to incorrect permissions in AppleMobileFileIntegrity. A local application can access sensitive user information.
80) Buffer overflow (CVE-ID: CVE-2022-32827)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in AppleAVD. A local application can trigger memory corruption and crash the system.
81) Buffer overflow (CVE-ID: CVE-2022-32899)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Apple Neural Engine. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
82) Buffer overflow (CVE-ID: CVE-2022-32898)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Apple Neural Engine. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
83) Out-of-bounds read (CVE-ID: CVE-2022-32858)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the Apple Neural Engine. A local application can trigger an out-of-bounds read error and read sensitive kernel state.
84) Buffer overflow (CVE-ID: CVE-2022-32947)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within GPU Drivers. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
85) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-32913)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improperly imposed security restrictions within the Image Processing subsystem. A local sandboxed application can determine, which app is currently using the camera.
86) Security features bypass (CVE-ID: CVE-2022-42811)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in Sandbox. A local application can gain unauthorized access to user information.
87) Out-of-bounds read (CVE-ID: CVE-2022-29458)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in convert_strings in tinfo/read_entry.c in the terminfo library. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
88) Security features bypass (CVE-ID: CVE-2022-32862)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in Sandbox. A local application can gain unauthorized access to sensitive information.
89) Security features bypass (CVE-ID: CVE-2022-32881)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in Sandbox. A local application can modify protected parts of the filesystem.90) Type conversion (CVE-ID: CVE-2022-28739)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a type conversion error in some convertion methods like Kernel#Float</code> and <code>String#to_f. A remote attacker can pass specially crafted data to the affected application, trigger memory corruption and execute arbitrary code in the system.
91) Race condition (CVE-ID: CVE-2022-42832)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition within ppp implementation. A local application can exploit the race and execute arbitrary code with kernel privileges.
92) Race condition (CVE-ID: CVE-2022-42831)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition within ppp implementation. A local application can exploit the race and execute arbitrary code with kernel privileges.
93) Buffer overflow (CVE-ID: CVE-2022-42830)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in ppp implementation. A local privileged application can trigger memory corruption and execute arbitrary code with kernel privileges.
94) Use-after-free (CVE-ID: CVE-2022-42829)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within ppp implementation. A local privileged application can trigger a use-after-free error and execute arbitrary code with kernel privileges.
95) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-32918)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in Photos. A local application can bypass Privacy preferences.
96) Race condition (CVE-ID: CVE-2022-32895)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to a race condition in PackageKit. A local application can exploit the race to modify protected parts of the filesystem.
97) Information disclosure (CVE-ID: CVE-2022-32879)
The vulnerability allows an attacker to gain access to potentially sensitive information.
The vulnerability exists due to improper state management in Notifications. An attacker with physical access to device can access contacts from the lock screen.
98) Information disclosure (CVE-ID: CVE-2022-42818)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to insufficient data protection in Notes. A remote attacker on the local network can track user activity.
99) Out-of-bounds write (CVE-ID: CVE-2021-39537)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
100) Out-of-bounds read (CVE-ID: CVE-2022-1622)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a boundary condition in LZWDecode() function in libtiff/tif_lzw.c:619. A remote attacker can create a specially crafted TIFF file, trick the victim into opening it, trigger out-of-bounds read error and to perform a denial of service attack.
101) Buffer overflow (CVE-ID: CVE-2022-32908)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in MediaLibrary. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
102) Information disclosure (CVE-ID: CVE-2022-32883)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a logic issue in the Maps component. A remote attacker can gain unauthorized access to sensitive location information.
103) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42815)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists within the Mail app due to improperly imposed security restrictions. A local application can gain access to sensitive user information.
104) Out-of-bounds write (CVE-ID: CVE-2022-42808)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel. A remote application can trigger an out-of-bounds write and execute arbitrary code with kernel privileges.
105) Use-after-free (CVE-ID: CVE-2022-32914)
The vulnerability allows a local application to escalate privileges on the system.
106) Buffer overflow (CVE-ID: CVE-2022-32924)
The vulnerability allows a local application to escalate privileges on the system.
The
vulnerability exists due to a boundary error in OS kernel. A local
application can trigger memory corruption and execute arbitrary code with kernel privileges.
107) Buffer overflow (CVE-ID: CVE-2022-32911)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
108) Buffer overflow (CVE-ID: CVE-2022-32866)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
109) Out-of-bounds read (CVE-ID: CVE-2022-32864)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the OS kernel. A local application can trigger an out-of-bounds read error and read kernel memory.
110) Race condition (CVE-ID: CVE-2022-42806)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition in IOKit. A local application can exploit the race and execute arbitrary code with kernel privileges.
111) Buffer overflow (CVE-ID: CVE-2022-42820)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in IOHIDFamily. A local application can trigger memory corruption and execute arbitrary code on the system.
112) Out-of-bounds read (CVE-ID: CVE-2022-32936)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in Intel Graphics Driver. A local application can trigger an out-of-bounds read error and read disclose kernel memory.
113) Information disclosure (CVE-ID: CVE-2022-32923)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists in WebKit due to an error in the JIT implementation. A remote attacker can trick the victim to visit a malicious website and disclose internal states of the application.
114) Buffer overflow (CVE-ID: CVE-2022-32926)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
115) Security features bypass (CVE-ID: CVE-2022-32935)
The vulnerability allows an attacker to gain access to sensitive information.
The vulnerability exists due to FaceTime allows interaction with sensitive content via lock screen. An attacker with physical access to device can view restricted content from the lock screen.
116) Buffer overflow (CVE-ID: CVE-2022-32941)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within ppp implementation. A remote attacker can trick the victim into connecting to a malicious PPP server, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
117) Buffer overflow (CVE-ID: CVE-2022-32944)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
118) Heap-based buffer overflow (CVE-ID: CVE-2022-3437)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. A remote user can send specially crafted data to the application, trigger a heap-based buffer overflow and perform a denial of service (DoS) attack.
119) Heap-based buffer overflow (CVE-ID: CVE-2022-37434)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a large gzip header within inflateGetHeader in inflate.c. A remote attacker can pass a specially crafted file to the affected application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
120) Out-of-bounds read (CVE-ID: CVE-2022-42798)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition when parsing media files in the Audio subsystem. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and gain access to sensitive information.
121) Heap-based buffer overflow (CVE-ID: CVE-2022-42800)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing gzip files. A remote attacker can pass a specially crafted file to the affected application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
122) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42801)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improperly imposed security restrictions within the OS kernel. A local application can execute arbitrary code with kernel privileges.
123) Race condition (CVE-ID: CVE-2022-42803)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition within the OS kernel. A local application can exploit the race and escalate privileges on the system.
124) Out-of-bounds read (CVE-ID: CVE-2022-42810)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the Model I/O subsystem. A remote attacker can create a specially crafted USD file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
125) Cleartext storage of sensitive information (CVE-ID: CVE-2022-32833)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists in the way website data are stored within the WebKit Storage. A local application can gain access to potentially sensitive information.
126) Improper access control (CVE-ID: CVE-2022-42838)
The vulnerability allows a local application to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in CoreMedia. A local application can bypass implemented security restrictions and continue receiving video after the app, which activated the video stream, was closed.
127) Out-of-bounds read (CVE-ID: CVE-2022-42833)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary condition within the GPU Drivers. A local application can trigger an out-of-bounds read error and execute arbitrary code with kernel privileges.
128) Improper access control (CVE-ID: CVE-2022-32945)
The vulnerability allows a local application to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions within the Core Bluetooth implementation. A local application can perform unauthorized recording of audio with paired AirPods.
129) Information disclosure (CVE-ID: CVE-2022-32849)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in iCloud Photo Library. A local application can gain unauthorized access to sensitive information on the system.
130) Security features bypass (CVE-ID: CVE-2022-42821)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to a logic error in BOM component. A local application can bypass Gatekeeper checks.
131) Use-after-free (CVE-ID: CVE-2022-42826)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
132) Use-after-free (CVE-ID: CVE-2022-46712)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the OS kernel subsystem. A local application can trigger a use-after-free error and execute arbitrary code with kernel privileges.
133) Race condition (CVE-ID: CVE-2022-46713)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition in PackageKit. A local application can exploit the race and modify protected parts of the file system.
134) Security restrictions bypass (CVE-ID: CVE-2022-22643)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists in FaceTime due to the ability to send audio and video files without knowledge of the user. An attacker with physical access to the system can share sensitive information via FaceTime.
135) Security restrictions bypass (CVE-ID: CVE-2022-22663)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improper securi5ty checks in the CoreTypes subsystem. A local application can bypass Gatekeeper checks.
136) Improper access control (CVE-ID: CVE-2022-32877)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper access restrictions in GarageBand. A local application can bypass implemented security restrictions and gain unauthorized access to sensitive user information.
137) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-32907)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improperly imposed security restrictions in AppleAVD. A local application can execute arbitrary code with kernel privileges.
138) State Issues (CVE-ID: CVE-2022-42807)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to a logic issue in Photos. A user can accidentally add a participant to a Shared Album by pressing the Delete key.
139) Improper access control (CVE-ID: CVE-2022-42834)
The vulnerability allows a local application to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions in Mail. A local application can gain unauthorized access to mail folder attachments through a temporary directory used during compression.
140) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42860)
The vulnerability allows a malicious application to bypass implemented security restrictions.
The vulnerability exists due to Boot Camp does not properly impose security restrictions. A local application can modify protected parts of the file system.
141) Buffer overflow (CVE-ID: CVE-2022-46709)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Wi-Fi component. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
142) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-48505)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper access restrictions within the System Settings component. A local user can modify protected parts of the file system.
143) Buffer overflow (CVE-ID: CVE-2022-42828)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in VPN. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
144) Security features bypass (CVE-ID: CVE-2022-46722)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to a logic error in Assets. A local application can modify protected parts of the file system,
145) Improper access control (CVE-ID: CVE-2022-32876)
The vulnerability allows a local application to gain unauthorized access to sensitive information.
The vulnerability exists due to a logic issue in shortcuts. A local application can view the hidden photos album without authentication.
146) State Issues (CVE-ID: CVE-2022-26699)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to a logic issue in TCC. A local application can perform a denial of service (DoS) attack.
147) Information disclosure (CVE-ID: CVE-2022-46707)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the Maps application. A local application can gain unauthorized access to location information.
148) Out-of-bounds read (CVE-ID: CVE-2022-32809)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted image file, trick the victim into opening it, trigger an out-of-bounds read error and crash the application.
149) Buffer overflow (CVE-ID: CVE-2022-47965)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Apple Neural Engine. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
150) Buffer overflow (CVE-ID: CVE-2022-46721)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Apple Neural Engine. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
151) Improper access control (CVE-ID: CVE-2022-48504)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper access restrictions in Find My. A local application can gain access to sensitive user information.
152) Security features bypass (CVE-ID: CVE-2022-32931)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in Sandbox. A local application can gain unauthorized access to sensitive information.153) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42816)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a logic issue in Beta Access Utility. A local application can modify protected parts of the file system.
154) Buffer overflow (CVE-ID: CVE-2022-47915)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Apple Neural Engine. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
155) Improper access control (CVE-ID: CVE-2022-48577)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper access restrictions in APFS. A local application can gain access to sensitive user information.
156) Buffer overflow (CVE-ID: CVE-2022-32889)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Apple Neural Engine. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.157) Security features bypass (CVE-ID: CVE-2022-48683)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly implemented security restrictions in CoreServices. A local application can break out of its sandbox.
Remediation
Install update from vendor's website.