CVE-2024-23300

7.8 HIGH

📋 TL;DR

CVE-2024-23300 is a use-after-free vulnerability in GarageBand that allows arbitrary code execution when processing malicious files. Attackers can craft files that trigger memory corruption, potentially leading to full system compromise. This affects GarageBand users on macOS who open untrusted project files.

💻 Affected Systems

Products:
  • GarageBand
Versions: Versions before 10.4.11
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects GarageBand on macOS; requires user interaction to open malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the GarageBand user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Application crash or limited code execution within GarageBand's sandbox, potentially allowing file system access to user documents.

🟢

If Mitigated

Application termination without code execution if exploit fails or memory protections catch the issue.

🌐 Internet-Facing: LOW - GarageBand is not typically internet-facing software.
🏢 Internal Only: MEDIUM - Risk exists when users open malicious project files from untrusted sources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user to open malicious GarageBand project file; exploitation depends on memory layout and protections.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GarageBand 10.4.11

Vendor Advisory: https://support.apple.com/en-us/HT214090

Restart Required: No

Instructions:

1. Open App Store on macOS. 2. Click Updates tab. 3. Install GarageBand 10.4.11 update. 4. Verify GarageBand version in About GarageBand menu.

🔧 Temporary Workarounds

Restrict file opening

all

Prevent opening untrusted GarageBand project files

Application sandboxing

macOS

Run GarageBand in restricted environment using macOS sandboxing

🧯 If You Can't Patch

  • Restrict GarageBand usage to trusted project files only
  • Implement application whitelisting to prevent unauthorized GarageBand execution

🔍 How to Verify

Check if Vulnerable:

Check GarageBand version in About GarageBand menu; versions before 10.4.11 are vulnerable.

Check Version:

Open GarageBand, click GarageBand menu > About GarageBand

Verify Fix Applied:

Confirm GarageBand version is 10.4.11 or later in About GarageBand menu.

📡 Detection & Monitoring

Log Indicators:

  • GarageBand crash logs with memory access violations
  • Unexpected GarageBand process termination

Network Indicators:

  • Unusual outbound connections from GarageBand process

SIEM Query:

process_name:"GarageBand" AND (event_type:"crash" OR exit_code:139)

🔗 References

📤 Share & Export