2024-10-29 08:00:49 +00:00
{
"id" : "CVE-2024-44256" ,
"sourceIdentifier" : "product-security@apple.com" ,
"published" : "2024-10-28T22:15:03.177" ,
2024-12-12 19:03:50 +00:00
"lastModified" : "2024-12-12T18:28:33.040" ,
"vulnStatus" : "Analyzed" ,
2024-10-29 08:00:49 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "The issue was addressed with improved input sanitization. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to break out of its sandbox."
2024-10-29 15:03:51 +00:00
} ,
{
"lang" : "es" ,
"value" : "El problema se solucion\u00f3 con una mejora en la desinfecci\u00f3n de entradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda salir de su zona protegida."
2024-10-29 08:00:49 +00:00
}
] ,
2024-10-29 21:03:20 +00:00
"metrics" : {
"cvssMetricV31" : [
2024-12-12 19:03:50 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" ,
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 6.0
} ,
2024-10-29 21:03:20 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.3 ,
"baseSeverity" : "CRITICAL" ,
2024-10-29 21:03:20 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-10-29 21:03:20 +00:00
} ,
"exploitabilityScore" : 2.5 ,
"impactScore" : 6.0
}
]
} ,
2024-12-12 19:03:50 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0" ,
"versionEndExcluding" : "13.7.1" ,
"matchCriteriaId" : "FD0D09F7-8683-476D-8D27-0C49A55D9938"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "14.0" ,
"versionEndExcluding" : "14.7.1" ,
"matchCriteriaId" : "901D36FD-C5D9-428D-BE13-662AC380C9AE"
}
]
}
]
}
] ,
2024-10-29 08:00:49 +00:00
"references" : [
{
"url" : "https://support.apple.com/en-us/121568" ,
2024-12-12 19:03:50 +00:00
"source" : "product-security@apple.com" ,
"tags" : [
"Vendor Advisory"
]
2024-10-29 08:00:49 +00:00
} ,
{
"url" : "https://support.apple.com/en-us/121570" ,
2024-12-12 19:03:50 +00:00
"source" : "product-security@apple.com" ,
"tags" : [
"Vendor Advisory"
]
2024-10-29 08:00:49 +00:00
}
]
}