First published: Mon Sep 16 2024(Updated: )
Accessibility. This issue was addressed by restricting options offered on a locked device.
Credit: product-security@apple.com Mickey Jin @patch1t Claudio Bozzato Cisco TalosFrancesco Benvenuto Cisco TalosAnton Boegler Snoolie Keffaber @0xilis an anonymous researcher Csaba Fitzl @theevilbit KandjiDenis Tokarev @illusionofcha0s dw0r ZeroPointer Lab working with Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeAntonio Zekić Andrew Lytvynov Rodolphe BRUNETTI @eisw0lf Kirin @Pwnrin Fudan UniversityLFY @secsys Fudan UniversityOlivier Levon ajajfxhj Rifa'i Rejal Maynando Zhongquan Li @Guluisacat Kirin @Pwnrin Kirin @Pwnrin NorthSealuckyu @uuulucky NorthSeaBohdan Stasiuk @Bohdan_Stasiuk Stephan Casas CVE-2024-44129 Alexander Heinrich SEEMOO DistriNet KU Leuven @vanhoefm TU Darmstadt @Sn0wfreeze Mathy Vanhoef Jeff Johnson (underpassapp.com) OSS-Fuzz Google Project ZeroNed Williamson Google Project ZeroCVE-2023-5841 냥냥 Narendra Bhati Cyber Security At Suma Soft PvtManager Cyber Security At Suma Soft PvtPune (India) Tashita Software Security Ron Masas Narendra Bhati Cyber Security at Suma Soft PvtManager Cyber Security at Suma Soft PvtPreet Dsouza (Fleming College Computer Security & Investigations Program) Domien Schepers Junsung Lee Holger Fuhrmannek Pedro Tôrres @t0rr3sp3dr0 Max Thomas Jake Derouin (jakederouin.com) Anamika Adhikari Bistrit Dahal Matej Moravec @MacejkoMoravec Justin Cohen K宝 LFY @secsys Smi1e yulige Cristian Dinca (icmd.tech) Pwn2car Trend Micro Zero Day InitiativePedro José Pereira Vieito @pvieito Arsenii Kostromin (0x3c3e) Abhay Kailasia @abhay_kailasia Lakshmi Narain College of Technology Bhopal IndiaTuan D. Hoang Daniele Antonioli @08Tc3wBB JamfJoshua Keller Lukas Kenneth Chew Wojciech Regula SecuRingOm Kothawade Zaprico DigitalOmar A. Alanis the UNTHSC College of PharmacyChi Yuan Chang ZUSO ARTtaikosoup Srijan Poudel Ron Masas BreakPointTim Michaud @TimGMichaud MoveworksChloe Surett Yiğit Can YILMAZ @yilmazcanyigit CVE-2024-44130 Halle Winkler Politepix @hallewinkler Rodolphe Brunetti @eisw0lf CVE-2023-4504 Meng Zhang (鲸落) NorthSeaBrian McNulty Computer ScienceCristian Dinca Computer ScienceRomania Vaibhav Prajapati CVE-2024-39894 Yiğit Can YILMAZ @yilmazcanyigit SecuRingVivek Dhar working as Assistant Sub-Inspector (RM) in Border Security Force (Frontier Headquarter BSF Kashmir) Om Kothawade the UNTHSC College of PharmacyJonathan Bar Or @yo_yo_yo_jbo MicrosoftCVE-2024-41957 Hafiizh HakTrakYoKo Kho @yokoacc HakTrakAntonio Zekic @antoniozekic ant4g0nist Charly Suchanek CVE-2024-44134 Tim Clem Gergely Kalman @gergely_kalman Koh M. Nakagawa @tsunek0h
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Ventura | <13.7 | 13.7 |
Apple macOS | <14.7 | 14.7 |
visionOS | <2 | 2 |
macOS | <15 | 15 |
Apple iOS, iPadOS, and watchOS | <11 | 11 |
tvOS | <18 | 18 |
Apple iOS and iPadOS | <18 | 18 |
Apple iOS, iPadOS, and macOS | <18 | 18 |
Apple iOS and iPadOS | <17.7 | 17.7 |
Apple iOS, iPadOS, and macOS | <17.7 | 17.7 |
Apple iOS, iPadOS, and macOS | <17.7 | |
iPhone OS | <17.7 | |
macOS | <13.7 | |
macOS | >=14.0<14.7 | |
tvOS | <18.0 | |
visionOS | <2.0 | |
Apple iOS, iPadOS, and watchOS | <11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-44176 is categorized as a denial-of-service vulnerability affecting multiple Apple operating systems.
To remediate CVE-2024-44176, upgrade to the latest versions of macOS, iOS, iPadOS, visionOS, watchOS, and tvOS as specified in the updates.
CVE-2024-44176 can lead to out-of-bounds access when processing images, potentially resulting in denial-of-service.
CVE-2024-44176 affects devices running macOS Ventura, iOS 17.7, iPadOS 17.7, visionOS 2, and certain versions of watchOS and tvOS.
CVE-2024-44176 was addressed in the 13.7 and later updates of macOS and iOS platforms.