CVE-2023-32435

A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
References
Link Resource
https://support.apple.com/en-us/HT213670 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213671 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213676 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213811 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213670 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213671 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213676 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213811 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:03

Type Values Removed Values Added
References () https://support.apple.com/en-us/HT213670 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213670 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213671 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213671 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213676 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213676 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213811 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213811 - Release Notes, Vendor Advisory

27 Jul 2023, 04:15

Type Values Removed Values Added
Summary This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3, Safari 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.

26 Jul 2023, 23:15

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2023/06/29/1', 'name': '[oss-security] 20230629 WebKitGTK and WPE WebKit Security Advisory WSA-2023-0005', 'tags': ['Mailing List'], 'refsource': 'MLIST'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Jul/5', 'name': '20230707 APPLE-SA-2023-06-21-3 iOS 15.7.7 and iPadOS 15.7.7', 'tags': [], 'refsource': 'FULLDISC'}
Summary A memory corruption issue was addressed with improved state management. This issue is fixed in Safari 16.4, iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3, Safari 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.

07 Jul 2023, 20:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/5 -

30 Jun 2023, 07:32

Type Values Removed Values Added
CPE cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
First Time Apple
Apple iphone Os
Apple macos
Apple safari
Apple ipados
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References (MLIST) http://www.openwall.com/lists/oss-security/2023/06/29/1 - (MLIST) http://www.openwall.com/lists/oss-security/2023/06/29/1 - Mailing List
References (MISC) https://support.apple.com/en-us/HT213811 - (MISC) https://support.apple.com/en-us/HT213811 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213676 - (MISC) https://support.apple.com/en-us/HT213676 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213670 - (MISC) https://support.apple.com/en-us/HT213670 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213671 - (MISC) https://support.apple.com/en-us/HT213671 - Release Notes, Vendor Advisory

29 Jun 2023, 15:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2023/06/29/1 -

23 Jun 2023, 19:24

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-23 18:15

Updated : 2024-11-21 08:03


NVD link : CVE-2023-32435

Mitre link : CVE-2023-32435

CVE.ORG link : CVE-2023-32435


JSON object : View

Products Affected

apple

  • ipados
  • iphone_os
  • safari
  • macos
CWE
CWE-787

Out-of-bounds Write