Lucene search

K
appleAppleAPPLE:8C961F9326687EDFF0810770601FEE36
HistoryMar 25, 2024 - 12:00 a.m.

About the security content of macOS Ventura 13.6.6

2024-03-2500:00:00
support.apple.com
12
macos ventura
coremedia
webrtc
arbitrary code execution
out-of-bounds write
cve-2024-1580
google project zero
security updates

CVSS3

5.9

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

17.1%

About the security content of macOS Ventura 13.6.6

This document describes the security content of macOS Ventura 13.6.6.

About Apple security updates

For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security releases page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

macOS Ventura 13.6.6

Released March 25, 2024

CoreMedia

Available for: macOS Ventura

Impact: Processing an image may lead to arbitrary code execution

Description: An out-of-bounds write issue was addressed with improved input validation.

CVE-2024-1580: Nick Galloway of Google Project Zero

WebRTC

Available for: macOS Ventura

Impact: Processing an image may lead to arbitrary code execution

Description: An out-of-bounds write issue was addressed with improved input validation.

CVE-2024-1580: Nick Galloway of Google Project Zero

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: August 13, 2024

Affected configurations

Vulners
Node
applemacosRange<13.6.6
VendorProductVersionCPE
applemacos*cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

CVSS3

5.9

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

17.1%