Update

An app may be able to bypass Privacy preferences & Other Fixes

Security Updates
MacOS Ventura 13.7
September 16, 2024

Accounts

  • Available for: macOS Ventura
  • Impact: An app may be able to leak sensitive user information
  • Description: The issue was addressed with improved checks.
  • CVE-2024-44129

App Intents

  • Available for: macOS Ventura
  • Impact: An app may be able to access sensitive data logged when a shortcut fails to launch another app
  • Description: This issue was addressed with improved redaction of sensitive information.
  • CVE-2024-44182: Kirin (@Pwnrin)

AppKit

  • Available for: macOS Ventura
  • Impact: An unprivileged app may be able to log keystrokes in other apps including those using secure input mode
  • Description: A logic issue was addressed with improved restrictions.
  • CVE-2024-27886: Stephan Casas, an anonymous researcher

AppleMobileFileIntegrity

  • Available for: macOS Ventura
  • Impact: An app may be able to access sensitive user data
  • Description: The issue was addressed with additional code-signing restrictions.
  • CVE-2024-40847: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

  • Available for: macOS Ventura
  • Impact: An app may be able to bypass Privacy preferences
  • Description: A downgrade issue was addressed with additional code-signing restrictions.
  • CVE-2024-40814: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

  • Available for: macOS Ventura
  • Impact: An app may be able to bypass Privacy preferences
  • Description: This issue was addressed with improved checks.
  • CVE-2024-44164: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

  • Available for: macOS Ventura
  • Impact: An app may be able to modify protected parts of the file system
  • Description: A library injection issue was addressed with additional restrictions.
  • CVE-2024-44168: Claudio Bozzato and Francesco Benvenuto of Cisco Talos

AppleMobileFileIntegrity

  • Available for: macOS Ventura
  • Impact: An attacker may be able to read sensitive information
  • Description: A downgrade issue was addressed with additional code-signing restrictions.
  • CVE-2024-40848: Mickey Jin (@patch1t)

Automator

  • Available for: macOS Ventura
  • Impact: An Automator Quick Action workflow may be able to bypass Gatekeeper
  • Description: This issue was addressed by adding an additional prompt for user consent.
  • CVE-2024-44128: Anton Boegler

bless

  • Available for: macOS Ventura
  • Impact: An app may be able to modify protected parts of the file system
  • Description: A permissions issue was addressed with additional restrictions.
  • CVE-2024-44151: Mickey Jin (@patch1t)

Compression

  • Available for: macOS Ventura
  • Impact: Unpacking a maliciously crafted archive may allow an attacker to write arbitrary files
  • Description: A race condition was addressed with improved locking.
  • CVE-2024-27876: Snoolie Keffaber (@0xilis)

Dock

  • Available for: macOS Ventura
  • Impact: An app may be able to access user-sensitive data
  • Description: A privacy issue was addressed by removing sensitive data.
  • CVE-2024-44177: an anonymous researcher

Game Center

  • Available for: macOS Ventura
  • Impact: An app may be able to access user-sensitive data
  • Description: A file access issue was addressed with improved input validation.
  • CVE-2024-40850: Denis Tokarev (@illusionofcha0s)

ImageIO

  • Available for: macOS Ventura
  • Impact: Processing an image may lead to a denial-of-service
  • Description: An out-of-bounds access issue was addressed with improved bounds checking.
  • CVE-2024-44176: dw0r of ZeroPointer Lab working with Trend Micro Zero Day Initiative, an anonymous researcher

Intel Graphics Driver

  • Available for: macOS Ventura
  • Impact: Processing a maliciously crafted texture may lead to unexpected app termination
  • Description: A buffer overflow issue was addressed with improved memory handling.
  • CVE-2024-44160: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative

Intel Graphics Driver

  • Available for: macOS Ventura
  • Impact: Processing a maliciously crafted texture may lead to unexpected app termination
  • Description: An out-of-bounds read was addressed with improved bounds checking.
  • CVE-2024-44161: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative

IOSurfaceAccelerator

  • Available for: macOS Ventura
  • Impact: An app may be able to cause unexpected system termination
  • Description: The issue was addressed with improved memory handling.
  • CVE-2024-44169: Antonio Zekić

Kernel

  • Available for: macOS Ventura
  • Impact: Network traffic may leak outside a VPN tunnel
  • Description: A logic issue was addressed with improved checks.
  • CVE-2024-44165: Andrew Lytvynov

Mail Accounts

  • Available for: macOS Ventura
  • Impact: An app may be able to access information about a user's contacts
  • Description: A privacy issue was addressed with improved private data redaction for log entries.
  • CVE-2024-40791: Rodolphe BRUNETTI (@eisw0lf)

Maps

  • Available for: macOS Ventura
  • Impact: An app may be able to read sensitive location information
  • Description: An issue was addressed with improved handling of temporary files.
  • CVE-2024-44181: Kirin(@Pwnrin) and LFY(@secsys) from Fudan University

mDNSResponder

  • Available for: macOS Ventura
  • Impact: An app may be able to cause a denial-of-service
  • Description: A logic error was addressed with improved error handling.
  • CVE-2024-44183: Olivier Levon

Notes

  • Available for: macOS Ventura
  • Impact: An app may be able to overwrite arbitrary files
  • Description: This issue was addressed by removing the vulnerable code.
  • CVE-2024-44167: ajajfxhj

PackageKit

  • Available for: macOS Ventura
  • Impact: An app may be able to modify protected parts of the file system
  • Description: This issue was addressed with improved validation of symlinks.
  • CVE-2024-44178: Mickey Jin (@patch1t)

Safari

  • Available for: macOS Ventura
  • Impact: Visiting a malicious website may lead to user interface spoofing
  • Description: This issue was addressed through improved state management.
  • CVE-2024-40797: Rifa'i Rejal Maynando

Sandbox

  • Available for: macOS Ventura
  • Impact: A malicious application may be able to access private information
  • Description: The issue was addressed with improved checks.
  • CVE-2024-44163: Zhongquan Li (@Guluisacat)

Shortcuts

  • Available for: macOS Ventura
  • Impact: A shortcut may output sensitive user data without consent
  • Description: This issue was addressed with improved redaction of sensitive information.
  • CVE-2024-44158: Kirin (@Pwnrin)

Shortcuts

  • Available for: macOS Ventura
  • Impact: An app may be able to observe data displayed to the user by Shortcuts
  • Description: A privacy issue was addressed with improved handling of temporary files.
  • CVE-2024-40844: Kirin (@Pwnrin) and luckyu (@uuulucky) of NorthSea

System Settings

  • Available for: macOS Ventura
  • Impact: An app may be able to access user-sensitive data
  • Description: A privacy issue was addressed with improved private data redaction for log entries.
  • CVE-2024-44166: Kirin (@Pwnrin) and LFY (@secsys) from Fudan University

System Settings

  • Available for: macOS Ventura
  • Impact: An app may be able to read arbitrary files
  • Description: A path handling issue was addressed with improved validation.
  • CVE-2024-44190: Rodolphe BRUNETTI (@eisw0lf)

Transparency

  • Available for: macOS Ventura
  • Impact: An app may be able to access user-sensitive data
  • Description: A permissions issue was addressed with additional restrictions.
  • CVE-2024-44184: Bohdan Stasiuk (@Bohdan_Stasiuk)
Version: macOS Ventura 13.7 Link
Receive Important Update Messages Stay tuned for upcoming Apple macOS updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad