SB2024102848 - Multiple vulnerabilities in macOS Sonoma 



SB2024102848 - Multiple vulnerabilities in macOS Sonoma

Published: October 28, 2024 Updated: January 20, 2025

Security Bulletin ID SB2024102848
Severity
High
Patch available
YES
Number of vulnerabilities 52
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 2% Medium 17% Low 81%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 52 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2024-44254)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to excessive data output in Shortcuts. A local application can access sensitive user data.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-44253)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in PackageKit. A local application can modify protected parts of the file system.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-44247)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in PackageKit. A local application can modify protected parts of the file system.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-44267)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in PackageKit. A local application can modify protected parts of the file system.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-44301)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in PackageKit. A local application can modify protected parts of the file system.


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-44275)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in PackageKit. A local application can modify protected parts of the file system.


7) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-44294)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in PackageKit. A local privileged application can delete protected system files.


8) Buffer overflow (CVE-ID: CVE-2024-44144)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing files in SceneKit. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and crash the application.


9) Heap-based buffer overflow (CVE-ID: CVE-2024-44218)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in SceneKit. A remote attacker can trick the victim into opening a specially crafted file, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


10) Security features bypass (CVE-ID: CVE-2024-44137)

The vulnerability allows an attacker to bypass implemented security restrictions.

The vulnerability exists due to improper checks in Screen Capture. An attacker with physical access to device can share items from the lock screen.


11) Improper access control (CVE-ID: CVE-2024-44269)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in Shortcuts. A local application can use shortcuts to access restricted files.


12) Improper access control (CVE-ID: CVE-2024-44156)

The vulnerability allows a local application to bypass Privacy preferences.

The vulnerability exists due to improper access restrictions in PackageKit. A local application can bypass Privacy preferences.


13) Out-of-bounds write (CVE-ID: CVE-2024-44236)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing files in sips. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds write and perform a denial of service (DoS) attack.


14) Out-of-bounds write (CVE-ID: CVE-2024-44237)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing files in sips. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds write and perform a denial of service (DoS) attack.


15) Out-of-bounds write (CVE-ID: CVE-2024-44284)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing files in sips. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds write and perform a denial of service (DoS) attack.


16) Out-of-bounds read (CVE-ID: CVE-2024-44279)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in sips. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


17) Out-of-bounds read (CVE-ID: CVE-2024-44281)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in sips. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


18) Out-of-bounds read (CVE-ID: CVE-2024-44283)

The vulnerability allows a remote attacker to crash the application.

The vulnerability exists due to a boundary condition in sips. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and crash the application.


19) Security features bypass (CVE-ID: CVE-2024-44278)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improper checks in Siri. An local application can access sensitive user data in system logs.


20) UNIX symbolic link following (CVE-ID: CVE-2024-44264)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a symlink following issue in SystemMigration. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.

Successful exploitation of this vulnerability may result in privilege escalation.


21) Information disclosure (CVE-ID: CVE-2024-44257)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in WindowServer. A local application can gain access to sensitive user information.


22) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-44196)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in PackageKit. A local application can modify protected parts of the file system.


23) Improper access control (CVE-ID: CVE-2024-44159)

The vulnerability allows a local application to bypass Privacy preferences.

The vulnerability exists due to improper access restrictions in PackageKit. A local application can bypass Privacy preferences.


24) Path traversal (CVE-ID: CVE-2024-44255)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to input validation error when handling shortcuts in App Support. A local application can run arbitrary shortcuts without user consent.


25) Improper access control (CVE-ID: CVE-2024-44289)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in Find My app. A local application can bypass implemented security restrictions and read sensitive location information.


26) Security features bypass (CVE-ID: CVE-2024-44270)

The vulnerability allows a sandbox process to bypass implemented security restrictions.

The vulnerability exists due to a logic issue in AppleMobileFileIntegrity. A sandboxed process can bypass implemented sandbox restrictions.


27) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2024-44280)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a downgrade issue in AppleMobileFileIntegrity on Intel-based Mac computers. A local application can modify protected parts of the file system.


28) Permissive List of Allowed Inputs (CVE-ID: CVE-2024-44260)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an error in Assets. A local application with root privileges can modify the contents of system files.


29) UNIX symbolic link following (CVE-ID: CVE-2024-44273)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a symlink following issue in CoreMedia Playback. A local application can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.

Successful exploitation of this vulnerability may result in privilege escalation.


30) Improper access control (CVE-ID: CVE-2024-44295)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper access restrictions in CoreServicesUIAgent. A local application can bypass implemented security restrictions and modify protected parts of the file system.


31) Out-of-bounds read (CVE-ID: CVE-2024-44240)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in CoreText. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


32) Out-of-bounds read (CVE-ID: CVE-2024-44302)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in CoreText. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


33) Out-of-bounds read (CVE-ID: CVE-2024-44213)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when parsing URLs in CUPS. A remote attacker on the local network can trigger an out-of-bounds read error and read contents of memory on the system.


34) Security features bypass (CVE-ID: CVE-2024-40855)

The vulnerability allows a sandbox process to bypass implemented security restrictions.

The vulnerability exists due to a logic issue in DiskArbitration. A sandboxed process can bypass implemented sandbox restrictions and access sensitive user data.


35) Out-of-bounds read (CVE-ID: CVE-2024-44282)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in Foundation. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


36) Security features bypass (CVE-ID: CVE-2024-44256)

The vulnerability allows a sandbox process to bypass implemented security restrictions.

The vulnerability exists due to a logic issue in Messages. A sandboxed process can bypass implemented sandbox restrictions and break out of its sandbox.


37) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-44265)

The vulnerability allows an attacker to bypass implemented security restrictions.

The vulnerability exists due to improperly imposed security restrictions in Game Controllers. An attacker with physical access to device can input Game Controller events to apps running on a locked device.


38) Out-of-bounds read (CVE-ID: CVE-2024-44215)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


39) Buffer overflow (CVE-ID: CVE-2024-44297)

The vulnerability allows a remote attacker to crash the application.

The vulnerability exists due to a boundary error when processing files in ImageIO. A remote attacker can create a specially crafted Office document, trick the victim into opening it, trigger memory corruption and perform a denial of service (DoS) attack.


40) Security features bypass (CVE-ID: CVE-2024-44216)

The vulnerability allows a sandbox process to bypass implemented security restrictions.

The vulnerability exists due to a logic issue in Installer. A sandboxed process can bypass implemented sandbox restrictions and access sensitive user data.


41) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-44287)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in Installer. A local application can modify protected parts of the file system.


42) Buffer overflow (CVE-ID: CVE-2024-44197)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in IOGPUFamily. A local application can trigger memory corruption and perform a denial of service (DoS) attack.


43) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2024-44239)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to the OS kernel writes kernel state into the log files. A local application can gain access to sensitive kernel information.


44) UNIX symbolic link following (CVE-ID: CVE-2024-44175)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a symlink following issue within the OS kernel. A local application can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.

Successful exploitation of this vulnerability may result in privilege escalation.


45) Security features bypass (CVE-ID: CVE-2024-44122)

The vulnerability allows a sandbox process to bypass implemented security restrictions.

The vulnerability exists due to a logic issue in LaunchServices. A local application can break out of its sandbox.


46) Information disclosure (CVE-ID: CVE-2024-44222)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in Maps. A local application can gain unauthorized access to sensitive location information.


47) Buffer overflow (CVE-ID: CVE-2024-44232)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in AppleAVD when handling media files. A remote attacker can create a specially crafted media file, trick the victim into opening it, trigger memory corruption and perform a denial of service (DoS) attack.


48) Buffer overflow (CVE-ID: CVE-2024-44233)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in AppleAVD when handling media files. A remote attacker can create a specially crafted media file, trick the victim into opening it, trigger memory corruption and perform a denial of service (DoS) attack.


49) Buffer overflow (CVE-ID: CVE-2024-44234)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in AppleAVD when handling media files. A remote attacker can create a specially crafted media file, trick the victim into opening it, trigger memory corruption and perform a denial of service (DoS) attack.


50) Buffer overflow (CVE-ID: CVE-2024-40854)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in GPU drivers. A local user can trigger memory corruption and perform a denial of service (DoS) attack.


51) Improper access control (CVE-ID: CVE-2024-54471)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions within the NetAuth component. A local application can gain unauthorized access to user's credentials.


52) Input validation error (CVE-ID: CVE-2024-54538)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the Security component. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.