CVE-2023-41064

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

21 Jun 2024, 16:14

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/09/21/4 - () http://www.openwall.com/lists/oss-security/2023/09/21/4 - Mailing List

22 Sep 2023, 00:15

Type Values Removed Values Added
References
  • (MISC) http://www.openwall.com/lists/oss-security/2023/09/21/4 -

21 Sep 2023, 19:15

Type Values Removed Values Added
Summary A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.9, macOS Big Sur 11.7.10, macOS Ventura 13.5.2, iOS 16.6.1 and iPadOS 16.6.1, iOS 15.7.9 and iPadOS 15.7.9. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
References
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/9', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/9', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/8', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/8', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/7', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/7', 'tags': [], 'refsource': 'MISC'}

18 Sep 2023, 13:15

Type Values Removed Values Added
References
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/9 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/8 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/7 -

12 Sep 2023, 13:09

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-120
First Time Apple macos
Apple ipados
Apple
Apple iphone Os
CPE cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
References (MISC) https://support.apple.com/en-us/HT213915 - (MISC) https://support.apple.com/en-us/HT213915 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213913 - (MISC) https://support.apple.com/en-us/HT213913 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213905 - (MISC) https://support.apple.com/en-us/HT213905 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213906 - (MISC) https://support.apple.com/en-us/HT213906 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213914 - (MISC) https://support.apple.com/en-us/HT213914 - Vendor Advisory

12 Sep 2023, 00:15

Type Values Removed Values Added
References
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/3', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/3', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/kb/HT213913', 'name': 'https://support.apple.com/kb/HT213913', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/kb/HT213914', 'name': 'https://support.apple.com/kb/HT213914', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/kb/HT213906', 'name': 'https://support.apple.com/kb/HT213906', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/4', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/4', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/kb/HT213915', 'name': 'https://support.apple.com/kb/HT213915', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/kb/HT213905', 'name': 'https://support.apple.com/kb/HT213905', 'tags': [], 'refsource': 'MISC'}
  • (MISC) https://support.apple.com/en-us/HT213913 -
  • (MISC) https://support.apple.com/en-us/HT213914 -
  • (MISC) https://support.apple.com/en-us/HT213915 -
Summary A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.5.2, iOS 16.6.1 and iPadOS 16.6.1. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.9, macOS Big Sur 11.7.10, macOS Ventura 13.5.2, iOS 16.6.1 and iPadOS 16.6.1, iOS 15.7.9 and iPadOS 15.7.9. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

11 Sep 2023, 19:15

Type Values Removed Values Added
References
  • (MISC) https://support.apple.com/kb/HT213913 -
  • (MISC) https://support.apple.com/kb/HT213914 -
  • (MISC) https://support.apple.com/kb/HT213915 -

08 Sep 2023, 22:15

Type Values Removed Values Added
References
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/4 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/3 -

07 Sep 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-07 18:15

Updated : 2024-06-21 16:14


NVD link : CVE-2023-41064

Mitre link : CVE-2023-41064

CVE.ORG link : CVE-2023-41064


JSON object : View

Products Affected

apple

  • macos
  • ipados
  • iphone_os
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')