Lucene search

K
appleAppleAPPLE:1154276895F922C984A4D3E78FFD7FD0
HistoryMar 07, 2023 - 12:00 a.m.

About the security content of GarageBand for macOS 10.4.8

2023-03-0700:00:00
support.apple.com
204
garageband
macos 10.4.8
security
elevated privileges
midi file
cve-2023-27960
cve-2023-27938

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

33.0%

About the security content of GarageBand for macOS 10.4.8

This document describes the security content of GarageBand for macOS 10.4.8.

About Apple security updates

For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

GarageBand for macOS 10.4.8

Released March 7, 2023

GarageBand

Available for: macOS Monterey 12.3 and later

Impact: An app may be able to gain elevated privileges during the installation of GarageBand

Description: This issue was addressed by removing the vulnerable code.

CVE-2023-27960: Mickey Jin (@patch1t)

GarageBand

Available for: macOS Monterey 12.3 and later

Impact: Parsing a maliciously crafted MIDI file may lead to an unexpected application termination or arbitrary code execution

Description: An out-of-bounds read issue was addressed with improved input validation.

CVE-2023-27938: Mickey Jin (@patch1t) of Trend Micro

Entry updated March 9, 2023

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: October 31, 2023

Affected configurations

Vulners
Node
applegaragebandRange<10.4.8
VendorProductVersionCPE
applegarageband*cpe:2.3:a:apple:garageband:*:*:*:*:*:*:*:*

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

33.0%

Related for APPLE:1154276895F922C984A4D3E78FFD7FD0