SB2023092664 - Multiple vulnerabilities in Apple macOS Sonoma 



SB2023092664 - Multiple vulnerabilities in Apple macOS Sonoma

Published: September 26, 2023 Updated: January 9, 2026

Security Bulletin ID SB2023092664
Severity
Critical
Patch available
YES
Number of vulnerabilities 108
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 1% High 11% Medium 9% Low 79%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 108 secuirty vulnerabilities.


1) Spoofing attack (CVE-ID: CVE-2023-40417)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data. A remote attacker can trick the victim to visit a specially crafted website and spoof website content.


2) Improper Authorization (CVE-ID: CVE-2023-41073)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper authorization in libxpc. A local application can gain unauthorized access to protected user data.


3) Out-of-bounds read (CVE-ID: CVE-2023-40403)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in libxslt. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


4) Error Handling (CVE-ID: CVE-2023-40427)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improved handling of caches in Maps. A local application can read sensitive location information.


5) Cleartext storage of sensitive information (CVE-ID: CVE-2023-32421)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists die to improved handling of temporary files in Messages application. A local application can observe unprotected user data.


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-41986)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions within the Music application. A local application can modify protected parts of the file system.


7) Security features bypass (CVE-ID: CVE-2023-40455)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improper permissions check in NetFSFramework. A local application can bypass sandbox restrictions.



8) Cleartext storage of sensitive information (CVE-ID: CVE-2023-40386)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists die to improved handling of temporary files in Notes application. A local application can access Notes attachments.


9) State Issues (CVE-ID: CVE-2023-37448)

The vulnerability allows an attacker to view restricted content from the lock screen.

The vulnerability exists due to a state issue in Power Management. An attacker with physical access to the system  can view restricted content from the lock screen.


10) Buffer overflow (CVE-ID: CVE-2023-41063)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in Pro Res. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.


11) Input validation error (CVE-ID: CVE-2023-40422)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in QuartzCore. A local application can perform a denial of service (DoS) attack.


12) Input validation error (CVE-ID: CVE-2023-39233)

The vulnerability allows a remote attacker to gain access to sensitive information

The vulnerability exists due to insufficient validation of user-supplied input in Safari. A remote attacker can trick the victim to visit a specially crafted website and gain access to sensitive information.


13) Security features bypass (CVE-ID: CVE-2023-40388)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to Safari can save photos to an unprotected location. A local application can gain access to potentially sensitive information.


14) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-35990)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improperly imposed security restrictions in Safari. A local application can identify what other apps a user has installed.


15) Buffer overflow (CVE-ID: CVE-2023-40452)

The vulnerability allows a local application to overwrite arbitrary files on the system.

The vulnerability exists due to a boundary error in Sandbox. A local application can trigger memory corruption and overwrite arbitrary files on the system.


16) Input validation error (CVE-ID: CVE-2023-40400)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input in libpcap. A remote attacker can pass specially crafted input to the system and execute arbitrary code on the system.


17) Improper Authorization (CVE-ID: CVE-2023-41078)

The vulnerability allows a local application can bypass implemented security restrictions.

The vulnerability exists due to improper authorization in Screen Sharing. A local application can bypass certain Privacy preferences.


18) Improper Authorization (CVE-ID: CVE-2023-41070)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper authorization in Share Sheet. A local application can access sensitive data logged when a user shares a link.


19) Insufficient UI Warning of Dangerous Operations (CVE-ID: CVE-2023-40541)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exist due to an error in Shortcuts. A local user can use a shortcut to output sensitive user data without consent.


20) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-41079)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to a logic error in Shortcuts. A local application can bypass Privacy preferences.


21) UNIX symbolic link following (CVE-ID: CVE-2023-41968)

The vulnerability allows a local application to read arbitrary files on the system.

The vulnerability exists due to a symlink following issue in StorageKit. A local application can read arbitrary files on the system.


22) Security features bypass (CVE-ID: CVE-2023-40450)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improperly imposed security restrictions in System Preferences. A local application can bypass Gatekeeper checks.


23) Improper access control (CVE-ID: CVE-2023-40424)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in TCC. A local application can access user-sensitive data.


24) Use-after-free (CVE-ID: CVE-2023-39434)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to open a specially crafted website and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


25) Buffer overflow (CVE-ID: CVE-2023-41074)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in WebKit. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


26) Buffer overflow (CVE-ID: CVE-2023-35074)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in WebKit. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


27) Buffer overflow (CVE-ID: CVE-2023-41993)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability is being actively exploited in the wild.


28) Improper Authentication (CVE-ID: CVE-2023-41066)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due improper authentication in Windows Server component. A local application can leak a user's credentials from secure text fields.


29) Race condition (CVE-ID: CVE-2023-41979)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a race condition in XProtectFramework. A local application can modify protected parts of the file system.


30) Improper access control (CVE-ID: CVE-2023-40454)

The vulnerability allows a local application to delete arbitrary files on the system.

The vulnerability exists due to improper access restrictions in libxpc. A local application can delete arbitrary files on the system.


31) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-41067)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improperly imposed security restrictions in LaunchServices. A local application can bypass Gatekeeper checks.


32) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-40384)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improperly imposed security restrictions in Airport. A local application can gain access to sensitive location information.


33) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-40406)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improperly imposed security restrictions in ColorSync. A local application can read arbitrary files on the system.


34) Buffer overflow (CVE-ID: CVE-2023-32377)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within AMD subsystem. A local user can trigger memory corruption and execute arbitrary code with kernel privileges.


35) Buffer overflow (CVE-ID: CVE-2023-38615)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within AMD subsystem. A local user can trigger memory corruption and execute arbitrary code with kernel privileges.

36) Security features bypass (CVE-ID: CVE-2023-40448)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to improper input validation in App Store. A remote attacker can trick the victim to visit a specially crafted website and break out of Web Content sandbox.


37) Buffer overflow (CVE-ID: CVE-2023-40432)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Apple Neural Engine. A local user can trigger memory corruption and execute arbitrary code with kernel privileges.

38) Out-of-bounds read (CVE-ID: CVE-2023-40399)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Apple Neural Engine. A local user can trigger an out-of-bounds read error and read contents of memory on the system.


39) Out-of-bounds read (CVE-ID: CVE-2023-40410)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Apple Neural Engine. A local user can trigger an out-of-bounds read error and read contents of memory on the system.


40) Error Handling (CVE-ID: CVE-2023-32361)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to incorrect error handling in AuthKit. A local application can gain access to user-sensitive data.


41) Out-of-bounds write (CVE-ID: CVE-2023-35984)

The vulnerability allows an attacker to compromise the affected system.

The vulnerability exists due to a boundary error in Bluetooth implementation. An attacker with physical proximity to the system can send specially crafted traffic to trigger an out-of-bounds write and execute arbitrary code.


42) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-40402)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improperly imposed security restrictions in Bluetooth. A local application can gain access sensitive user data.


43) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-40426)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improperly imposed security restrictions in Bluetooth. A local application can bypass certain Privacy preferences.

44) Information disclosure (CVE-ID: CVE-2023-41065)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by bootp. A local application can read sensitive location information.


45) Cleartext storage of sensitive information (CVE-ID: CVE-2023-29497)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to Calendar application stores data in clear text in temporary files. A local user can gain access to sensitive information.


46) Improperly implemented security check for standard (CVE-ID: CVE-2023-38596)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists within the CFNetwork component, which fails to enforce App Transport Security. A local application can gain access to sensitive information.


47) Buffer overflow (CVE-ID: CVE-2023-40420)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in CoreAnimation. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and perform a denial of service (DoS) attack.


48) Input validation error (CVE-ID: CVE-2023-40429)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input within the OS kernel. A local application can gain access to sensitive user data.


49) Buffer overflow (CVE-ID: CVE-2023-40407)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in CUPS. A remote attacker can send specially crafted data to the server, trigger memory corruption and perform a denial of service (DoS) attack.


50) Input validation error (CVE-ID: CVE-2023-32396)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Dev Tools. A local application can escalate privileges on the system.


51) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-41980)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improperly imposed security restrictions in FileProvider. A local application can bypass Privacy preferences.


52) Error Handling (CVE-ID: CVE-2023-40395)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper error handling in Game Center. A local application can access contacts.


53) Out-of-bounds read (CVE-ID: CVE-2023-40391)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in GPU Drivers. A local application can trigger an out-of-bounds read error and disclose kernel memory.


54) Resource exhaustion (CVE-ID: CVE-2023-40441)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources in GPU Drivers. A remote attacker can trick the victim to visit a specially crafted website, trigger resource exhaustion and perform a denial of service (DoS) attack.


55) Information disclosure (CVE-ID: CVE-2023-23495)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by iCloud. A local application can gain unauthorized access to sensitive user data.


56) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-40434)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improperly imposed security restrictions in iCloud Photo Library. A local application can access a user's Photos Library.


57) Security features bypass (CVE-ID: CVE-2023-38586)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to missing restrictions in Image Capture. A local application can bypass sandbox restrictions.


58) Out-of-bounds read (CVE-ID: CVE-2023-40436)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in IOAcceleratorFamily. A remote attacker can trigger an out-of-bounds read error and read contents of memory on the system or crash the kernel.


59) Use-after-free (CVE-ID: CVE-2023-41995)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the OS kernel. A local application can trigger a use-after-free error and execute arbitrary code on the system with kernel privileges.


60) Security features bypass (CVE-ID: CVE-2023-41981)

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to improper memory handling. A local user can bypass kernel memory mitigations and execute arbitrary code on the system.



61) Buffer overflow (CVE-ID: CVE-2023-41984)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.


62) Input validation error (CVE-ID: CVE-2023-42826)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input within the Hydra framework. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code on the system.


63) Buffer overflow (CVE-ID: CVE-2023-38610)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the Wi-Fi subsystem. A remote attacker can send specially crafted data to the system, trigger memory corruption and execute arbitrary code with kernel privileges.


64) Information disclosure (CVE-ID: CVE-2023-40411)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the FileProvider. A local application can gain access to sensitive user information.


65) Input validation error (CVE-ID: CVE-2023-42933)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Dev Tools. A local application can escalate privileges on the system.


66) Improper access control (CVE-ID: CVE-2023-41994)

The vulnerability allows a local application to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in CoreMedia. A camera extension may be able to access the camera view from apps other than the app for which it was granted permission.


67) Out-of-bounds read (CVE-ID: CVE-2023-42876)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in BOM. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


68) Buffer overflow (CVE-ID: CVE-2023-42871)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Apple Neural Engine. A local user can trigger memory corruption and execute arbitrary code with kernel privileges.

69) Improper access control (CVE-ID: CVE-2023-42872)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in AppleMobileFileIntegrity. A local application can gain access to sensitive user information.


70) Security features bypass (CVE-ID: CVE-2023-42929)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper permissions checks in AppSandbox. A local application can gain access to sensitive user information.



71) Security features bypass (CVE-ID: CVE-2023-40430)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to a logic issue in Sandbox. A local application can access removable volumes without user consent.


72) Missing Authorization (CVE-ID: CVE-2023-40393)

The vulnerability allows an attacker to gain unauthorized access to photos.

The vulnerability exists due to missing authorization in Photos. An attacker with physical access to device can view photos in the Hidden Photos Album.


73) Use-after-free (CVE-ID: CVE-2023-42870)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the OS kernel. A local application can trigger a use-after-free error and execute arbitrary code on the system with kernel privileges.


74) Information disclosure (CVE-ID: CVE-2023-41987)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive in Printing subsystem. A local application can gain access to sensitive information.


75) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-42934)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to incorrect permissions in Photos Storage. A local application with root privileges can access private information.


76) Type Confusion (CVE-ID: CVE-2023-41060)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error within the OS kernel. A remote attacker can send specially crafted data to the system, trigger a type confusion error and execute arbitrary code.



77) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-38607)

The vulnerability allows a local application to alter printer settings.

The vulnerability exists due to improper access restrictions in Printing subsystem. A local application can alter printer cache and modify printer settings.


78) Improper access control (CVE-ID: CVE-2023-38612)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in Ask to Buy. A local application can gain access to sensitive user information.


79) Creation of Temporary File With Insecure Permissions (CVE-ID: CVE-2023-40438)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper handling of temporary files in Core Image. A local application can access edited photos saved to a temporary directory.



80) Untrusted search path (CVE-ID: CVE-2023-38408)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to usage of an insecure search path within the PKCS#11 feature in ssh-agent. A remote attacker can trick the victim into connecting to a malicious SSH server and execute arbitrary code on the system, if an agent is forwarded to an attacker-controlled system.

Note, this vulnerability exists due to incomplete fix for #VU2015 (CVE-2016-10009).


81) Improper Authentication (CVE-ID: CVE-2023-40401)

The vulnerability allows an attacker to bypass authentication process.

The vulnerability exists due to improper authentication in Passkeys. An attacker with physical access to the device can access passkeys without authentication.


82) Security features bypass (CVE-ID: CVE-2023-41996)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to an error in Sandbox. A local application that fails verification checks can still be launched on the system.



83) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-40443)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in Spotlight. A local application can gain root privileges on the system.


84) Use-after-free (CVE-ID: CVE-2023-40414)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.



85) Information disclosure (CVE-ID: CVE-2023-32359)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a logic issue in WebKit. A remote attacker can trick the victim to visit a specially crafted website and use the VoiceOver feature to read aloud a user's password.


86) Information disclosure (CVE-ID: CVE-2023-40385)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by WebKit. A remote attacker can view leaked DNS queries with Private Relay turned on.


87) Buffer overflow (CVE-ID: CVE-2023-42833)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


88) Security features bypass (CVE-ID: CVE-2023-40528)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to an error within the Core Data component. A local application can bypass Privacy preferences.


89) Information disclosure (CVE-ID: CVE-2023-42948)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to insecure way System Settings handles recovery process. A Wi-Fi password is not deleted when activating a Mac in macOS Recovery.


90) Incorrect default permissions (CVE-ID: CVE-2023-42949)

The vulnerability allows a local application to access photos saved to temporary directory.

The vulnerability exists due to incorrect default permissions in Photos. A local application can access edited photos saved to a temporary directory.


91) Buffer overflow (CVE-ID: CVE-2023-40396)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in IOUserEthernet. A local user can trigger memory corruption and execute arbitrary code with kernel privileges.


92) Security features bypass (CVE-ID: CVE-2023-42918)

The vulnerability allows a malicious application to bypass implemented security restrictions.

The vulnerability exists due to improperly imposed permissions in Model I/O. A local application can bypass sandbox restrictions.


93) Information disclosure (CVE-ID: CVE-2023-42957)

The vulnerability allows a malicious application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Maps application. A malicious application can read sensitive location information.


94) Race condition (CVE-ID: CVE-2023-42959)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in graphics drivers. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


95) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2023-42943)

The vulnerability allows a malicious application to gain access to sensitive information.

The vulnerability exists due to Clock application stores sensitive information into log files. A malicious application can read read sensitive location information.


96) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-42925)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in AppSandbox. A local user can access Notes attachments.


97) Improper access control (CVE-ID: CVE-2023-41076)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper access restrictions in Windows Installer. A local application can execute arbitrary code with elevated privileges.


98) Input validation error (CVE-ID: CVE-2023-42977)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to insufficient validation of path in Power Services. A local application can break out of its sandbox.


99) Out-of-bounds read (CVE-ID: CVE-2023-42983)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in Model I/O. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.


100) Out-of-bounds read (CVE-ID: CVE-2023-42982)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in Model I/O. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.


101) Out-of-bounds read (CVE-ID: CVE-2023-42981)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in Model I/O. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.


102) Security features bypass (CVE-ID: CVE-2023-42961)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improper path validation in Intents. A local application can bypass sandbox restrictions.


103) Security features bypass (CVE-ID: CVE-2023-42969)

The vulnerability allows a local application to break out of its sandbox.

The vulnerability exists due to an error when handling cache in the Apple Neural Engine. A local application can break out of its sandbox and escalate privileges on the system.


104) Improper access control (CVE-ID: CVE-2023-38614)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in TCC. A local application can access sensitive user data.


105) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-41077)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improperly imposed security restrictions in Image Capture. A local application can gain unauthorized access to protected user data.


106) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2023-40425)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to inclusion of sensitive information into log files in Sandbox. A local application with root privileges can access private information.


107) Use-after-free (CVE-ID: CVE-2023-42970)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when handling HTML content. A remote attacker can trick the victim into visiting a specially crafted website and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


108) Buffer overflow (CVE-ID: CVE-2023-42875)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.