SB2024102980 - Multiple vulnerabilities in Apple Safari



SB2024102980 - Multiple vulnerabilities in Apple Safari

Published: October 29, 2024 Updated: January 20, 2025

Security Bulletin ID SB2024102980
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 20% Medium 60% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Security features bypass (CVE-ID: CVE-2024-44259)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to an error within Safari Downloads. A remote attacker can misuse a trust relationship to download malicious content and trick the victim into executing a malicious file.


2) Information disclosure (CVE-ID: CVE-2024-44229)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in Safari Private Browsing. A remote attacker can gain unauthorized access to browsing history.


3) Security features bypass (CVE-ID: CVE-2024-44296)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to improper checks in WebKit. A remote attacker can trick the victim into visiting a specially crafted website and prevent Content Security Policy from being enforced.


4) Buffer overflow (CVE-ID: CVE-2024-44244)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in WebKit. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Information disclosure (CVE-ID: CVE-2024-44212)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to incorrect handling of cookie origin. A remote attacker can gain access to cookies set by another website.


Remediation

Install update from vendor's website.