SB2025051258 - Multiple vulnerabilities in Apple macOS Ventura
Published: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 30 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2024-8176)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when handling XML content. A remote attacker can pass specially crafted XML content to the application, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Memory corruption (CVE-ID: CVE-2025-24155)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to a boundary error in WebContentFilter. A local application can disclose kernel memory.
3) Information disclosure (CVE-ID: CVE-2025-31220)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in Weather. A local application can read sensitive location information.
4) Information exposure through log files (CVE-ID: CVE-2025-31242)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to inclusion of sensitive information into a log file in StoreKit. A local application can access sensitive user data.
5) Input validation error (CVE-ID: CVE-2025-30442)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of untrusted input in SoftwareUpdate. A local application can escalate privileges on the system.
6) State issues (CVE-ID: CVE-2025-31247)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to a state management issue in SharedFileList. A remote attacker can protected parts of the file system.
7) Information exposure through log files (CVE-ID: CVE-2025-31213)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to inclusion of sensitive information into a log file in Security. A local application can access associated usernames and websites in a user\'s iCloud Keychain.
8) Integer overflow (CVE-ID: CVE-2025-31221)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to integer overflow in Security. A remote attacker can trigger integer overflow and read parts of kernel memory.
9) Information disclosure (CVE-ID: CVE-2025-31224)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in Sandbox. A local application can bypass certain Privacy preferences.
10) Improper access control (CVE-ID: CVE-2025-31245)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper access restrictions in Pro Res. A local application can cause unexpected system termination.
11) Information exposure through log files (CVE-ID: CVE-2025-24142)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to inclusion of sensitive information into a log file in Notification Center. A local application can access sensitive user data.
12) Improper input validation (CVE-ID: CVE-2025-24274)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation in Mobile Device Service. A local application can gain root privileges.
13) Improper access control (CVE-ID: CVE-2025-31222)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper access restrictions in mDNSResponder. A local user can elevate privileges.
14) Protection Mechanism Failure (CVE-ID: CVE-2025-30440)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures in Libinfo. A local application can bypass ASLR protection mechanism and elevate privileges on the system.
15) Double free (CVE-ID: CVE-2025-31241)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the OS kernel. A remote attacker trigger a double free error and crash the system.
16) Input validation error (CVE-ID: CVE-2025-31240)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in afpfs. A remote attacker can trick the victim into connecting to a malicious AFP share and perform a denial of service (DoS) attack.
17) Buffer overflow (CVE-ID: CVE-2025-31219)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing Microsoft Office files. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
18) Memory leak (CVE-ID: CVE-2025-24144)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due memory leak within the OS kernel. A local application can obtain sensitive kernel state.
19) Improper access control (CVE-ID: CVE-2025-31232)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper access restrictions in Installer. A local application can access sensitive user data.
20) Missing Authorization (CVE-ID: CVE-2025-30448)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to missing authentication. A remote attacker can turn on sharing of an iCloud folder without authentication.
21) Permissions, privileges, and access controls (CVE-ID: CVE-2025-24258)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improperly imposed security restrictions in DiskArbitration. A local application can gain root privileges.
22) Improper access control (CVE-ID: CVE-2025-30453)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper access restrictions in DiskArbitration. A local application can gain root privileges.
23) Buffer overflow (CVE-ID: CVE-2025-31233)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in CoreMedia when processing video files. A remote attacker can create a specially crafted video file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
24) Use after free (CVE-ID: CVE-2025-31239)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error in CoreMedia. A remote attacker can trick the victim into opening a specially crafted file and perform an unexpected app termination.
25) Out-of-bounds read (CVE-ID: CVE-2025-31209)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in CoreGraphics. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.
26) Improper input validation (CVE-ID: CVE-2025-31196)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient input validation in CoreGraphics. A remote attacker can trick the victim into opening a specially crafted file and perform a denial-of-service or potentially disclose memory contents.
27) Improper access control (CVE-ID: CVE-2025-31208)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper access restrictions in CoreAudio. A remote attacker can trick the victim into opening a specially crafted file and perform an unexpected app termination.
28) Double free (CVE-ID: CVE-2025-31235)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in Audio. A remote attacker can trick the victim into opening a specially crafted media file, trigger a double free error and perform a denial of service (DoS) attack.
29) Buffer overflow (CVE-ID: CVE-2025-31251)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing specially crafted image files in AppleJPEG. A remote attacker can trick the victim into opening a specially crafted file, trigger memory corruption and crash the application.
30) Input validation error (CVE-ID: CVE-2025-31237)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in afpfs. A remote attacker can trick the victim into connecting to a malicious AFP share and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.