Update

Fixed:Impact: A sandboxed process may be able to circumvent sandbox restrictions

About the security content of macOS Ventura 13.7.1
Released October 28, 2024

App Support
Available for: macOS Ventura
Impact: A malicious app may be able to run arbitrary shortcuts without user consent
Description: A path handling issue was addressed with improved logic.
CVE-2024-44255: an anonymous researcher

AppleMobileFileIntegrity
Available for: macOS Ventura
Impact: A sandboxed process may be able to circumvent sandbox restrictions
Description: A logic issue was addressed with improved validation.
CVE-2024-44270: Mickey Jin (@patch1t)

AppleMobileFileIntegrity
Available for: macOS Ventura
Impact: An app may be able to modify protected parts of the file system
Description: A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions.
CVE-2024-44280: Mickey Jin (@patch1t)

ARKit
Available for: macOS Ventura
Impact: Processing a maliciously crafted file may lead to heap corruption
Description: The issue was addressed with improved checks.
CVE-2024-44126: Holger Fuhrmannek

Assets
Available for: macOS Ventura
Impact: A malicious app with root privileges may be able to modify the contents of system files
Description: This issue was addressed by removing the vulnerable code.
CVE-2024-44260: Mickey Jin (@patch1t)

CoreServicesUIAgent
Available for: macOS Ventura
Impact: An app may be able to modify protected parts of the file system
Description: This issue was addressed with additional entitlement checks.
CVE-2024-44295: an anonymous researcher

CoreText
Available for: macOS Ventura
Impact: Processing a maliciously crafted font may result in the disclosure of process memory
Description: The issue was addressed with improved checks.
CVE-2024-44240: Hossein Lotfi (@hosselot) of Trend Micro Zero Day
Initiative
CVE-2024-44302: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

CUPS
Available for: macOS Ventura
Impact: An attacker in a privileged network position may be able to leak sensitive user information
Description: An issue existed in the parsing of URLs. This issue was addressed with improved input validation.
CVE-2024-44213: Alexandre Bedard

DiskArbitration
Available for: macOS Ventura
Impact: A sandboxed app may be able to access sensitive user data
Description: The issue was addressed with improved checks.
CVE-2024-40855: Csaba Fitzl (@theevilbit) of Kandji

Find My
Available for: macOS Ventura
Impact: An app may be able to read sensitive location information
Description: A privacy issue was addressed with improved private data redaction for log entries.
CVE-2024-44289: Kirin (@Pwnrin)

Foundation
Available for: macOS Ventura
Impact: Parsing a file may lead to disclosure of user information
Description: An out-of-bounds read was addressed with improved input validation.
CVE-2024-44282: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

Game Controllers
Available for: macOS Ventura
Impact: An attacker with physical access can input Game Controller events to apps running on a locked device
Description: The issue was addressed by restricting options offered on a locked device.
CVE-2024-44265: Ronny Stiftel

ImageIO
Available for: macOS Ventura
Impact: Processing an image may result in disclosure of process memory
Description: This issue was addressed with improved checks.
CVE-2024-44215: Junsung Lee working with Trend Micro Zero Day Initiative

ImageIO
Available for: macOS Ventura
Impact: Processing a maliciously crafted message may lead to a denial-of-service
Description: The issue was addressed with improved bounds checks.
CVE-2024-44297: Jex Amro

Installer
Available for: macOS Ventura
Impact: An app may be able to access user-sensitive data
Description: An access issue was addressed with additional sandbox restrictions.
CVE-2024-44216: Zhongquan Li (@Guluisacat)

Installer
Available for: macOS Ventura
Impact: A malicious application may be able to modify protected parts of the file system
Description: The issue was addressed with improved checks.
CVE-2024-44287: Mickey Jin (@patch1t)

IOGPUFamily
Available for: macOS Ventura
Impact: A malicious app may be able to cause a denial-of-service
Description: The issue was addressed with improved memory handling.
CVE-2024-44197: Wang Yu of Cyberserval

Kernel
Available for: macOS Ventura
Impact: An app may be able to leak sensitive kernel state
Description: An information disclosure issue was addressed with improved private data redaction for log entries.
CVE-2024-44239: Mateusz Krzywicki (@krzywix)

LaunchServices
Available for: macOS Ventura
Impact: An application may be able to break out of its sandbox
Description: A logic issue was addressed with improved checks.
CVE-2024-44122: an anonymous researcher

Maps
Available for: macOS Ventura
Impact: An app may be able to read sensitive location information
Description: This issue was addressed with improved redaction of sensitive information.
CVE-2024-44222: Kirin (@Pwnrin)

Messages
Available for: macOS Ventura
Impact: An app may be able to break out of its sandbox
Description: The issue was addressed with improved input sanitization.
CVE-2024-44256: Mickey Jin (@patch1t)

PackageKit
Available for: macOS Ventura
Impact: An app may be able to bypass Privacy preferences
Description: A path deletion vulnerability was addressed by preventing vulnerable code from running with privileges.
CVE-2024-44156: Arsenii Kostromin (0x3c3e)
CVE-2024-44159: Mickey Jin (@patch1t)

PackageKit
Available for: macOS Ventura
Impact: An app may be able to modify protected parts of the file system
Description: A permissions issue was addressed with additional restrictions.
CVE-2024-44196: Csaba Fitzl (@theevilbit) of Kandji

PackageKit
Available for: macOS Ventura
Impact: An app may be able to modify protected parts of the file system
Description: The issue was addressed with improved checks.
CVE-2024-44253: Mickey Jin (@patch1t), Csaba Fitzl (@theevilbit) of Kandji

PackageKit
Available for: macOS Ventura
Impact: A malicious application may be able to modify protected parts of the file system
Description: The issue was addressed with improved checks.
CVE-2024-44247: Un3xploitable of CW Research Inc
CVE-2024-44267: Bohdan Stasiuk (@Bohdan_Stasiuk), Un3xploitable of CW Research Inc, Pedro Tôrres (@t0rr3sp3dr0)
CVE-2024-44301: Bohdan Stasiuk (@Bohdan_Stasiuk), Un3xploitable of CW Research Inc, Pedro Tôrres (@t0rr3sp3dr0)
CVE-2024-44275: Arsenii Kostromin (0x3c3e)

PackageKit
Available for: macOS Ventura
Impact: An attacker with root privileges may be able to delete protected system files
Description: A path deletion vulnerability was addressed by preventing vulnerable code from running with privileges.
CVE-2024-44294: Mickey Jin (@patch1t)

Screen Capture
Available for: macOS Ventura
Impact: An attacker with physical access may be able to share items from the lock screen
Description: The issue was addressed with improved checks.
CVE-2024-44137: Halle Winkler, Politepix @hallewinkler

Shortcuts
Available for: macOS Ventura
Impact: An app may be able to access sensitive user data
Description: This issue was addressed with improved redaction of sensitive information.
CVE-2024-44254: Kirin (@Pwnrin)

Shortcuts
Available for: macOS Ventura
Impact: A malicious app may use shortcuts to access restricted files
Description: A logic issue was addressed with improved checks.
CVE-2024-44269: an anonymous researcher

sips
Available for: macOS Ventura
Impact: Processing a maliciously crafted file may lead to unexpected app termination
Description: An out-of-bounds access issue was addressed with improved bounds checking.
CVE-2024-44236: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative
CVE-2024-44237: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

sips
Available for: macOS Ventura
Impact: Parsing a maliciously crafted file may lead to an unexpected app termination
Description: An out-of-bounds write issue was addressed with improved input validation.
CVE-2024-44284: Junsung Lee, dw0r! working with Trend Micro Zero Day Initiative

sips
Available for: macOS Ventura
Impact: Parsing a file may lead to disclosure of user information
Description: An out-of-bounds read was addressed with improved input validation.
CVE-2024-44279: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative
CVE-2024-44281: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

sips
Available for: macOS Ventura
Impact: Parsing a maliciously crafted file may lead to an unexpected app termination
Description: An out-of-bounds read was addressed with improved bounds checking.
CVE-2024-44283: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

Siri
Available for: macOS Ventura
Impact: A sandboxed app may be able to access sensitive user data in system logs
Description: An information disclosure issue was addressed with improved private data redaction for log entries.
-44278: Kirin (@Pwnrin)

SystemMigration
Available for: macOS Ventura
Impact: A malicious app may be able to create symlinks to protected regions of the disk
Description: This issue was addressed with improved validation of symlinks.
CVE-2024-44264: Mickey Jin (@patch1t)

WindowServer
Available for: macOS Ventura
Impact: An app may be able to access sensitive user data
Description: This issue was addressed with improved redaction of sensitive information.
CVE-2024-44257: Bohdan Stasiuk (@Bohdan_Stasiuk)

Version: MacOS Ventura 13.7.1 Link
Receive Important Update Messages Stay tuned for upcoming Apple macOS updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad