CVE-2023-23514

A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, macOS Big Sur 11.7.5. An app may be able to execute arbitrary code with kernel privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:46

Type Values Removed Values Added
References () https://support.apple.com/en-us/HT213633 - Vendor Advisory () https://support.apple.com/en-us/HT213633 - Vendor Advisory
References () https://support.apple.com/en-us/HT213635 - Vendor Advisory () https://support.apple.com/en-us/HT213635 - Vendor Advisory
References () https://support.apple.com/en-us/HT213670 - () https://support.apple.com/en-us/HT213670 -
References () https://support.apple.com/en-us/HT213675 - () https://support.apple.com/en-us/HT213675 -
References () https://support.apple.com/en-us/HT213677 - () https://support.apple.com/en-us/HT213677 -

27 Jul 2023, 04:15

Type Values Removed Values Added
Summary A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.2.1, iOS 16.3.1 and iPadOS 16.3.1. An app may be able to execute arbitrary code with kernel privileges.. A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, macOS Big Sur 11.7.5. An app may be able to execute arbitrary code with kernel privileges.
References
  • {'url': 'https://support.apple.com/kb/HT213675', 'name': 'https://support.apple.com/kb/HT213675', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'https://support.apple.com/kb/HT213677', 'name': 'https://support.apple.com/kb/HT213677', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Mar/18', 'name': '20230327 APPLE-SA-2023-03-27-4 macOS Monterey 12.6.4', 'tags': [], 'refsource': 'FULLDISC'}
  • {'url': 'https://support.apple.com/kb/HT213670', 'name': 'https://support.apple.com/kb/HT213670', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Mar/21', 'name': '20230327 APPLE-SA-2023-03-27-5 macOS Big Sur 11.7.5', 'tags': [], 'refsource': 'FULLDISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Mar/17', 'name': '20230327 APPLE-SA-2023-03-27-3 macOS Ventura 13.3', 'tags': [], 'refsource': 'FULLDISC'}
  • {'url': 'http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html', 'name': 'http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html', 'tags': [], 'refsource': 'MISC'}
  • (MISC) https://support.apple.com/en-us/HT213670 -
  • (MISC) https://support.apple.com/en-us/HT213677 -
  • (MISC) https://support.apple.com/en-us/HT213675 -

Information

Published : 2023-02-27 20:15

Updated : 2024-11-21 07:46


NVD link : CVE-2023-23514

Mitre link : CVE-2023-23514

CVE.ORG link : CVE-2023-23514


JSON object : View

Products Affected

apple

  • iphone_os
  • macos
  • ipados
CWE
CWE-416

Use After Free