CVE-2023-32373

A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
References
Link Resource
https://security.gentoo.org/glsa/202401-04 Third Party Advisory
https://support.apple.com/en-us/HT213757 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213758 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213761 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213762 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213764 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213765 Release Notes Vendor Advisory
https://security.gentoo.org/glsa/202401-04 Third Party Advisory
https://support.apple.com/en-us/HT213757 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213758 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213761 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213762 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213764 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213765 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:03

Type Values Removed Values Added
References () https://security.gentoo.org/glsa/202401-04 - Third Party Advisory () https://security.gentoo.org/glsa/202401-04 - Third Party Advisory
References () https://support.apple.com/en-us/HT213757 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213757 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213758 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213758 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213761 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213761 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213762 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213762 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213764 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213764 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213765 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213765 - Release Notes, Vendor Advisory

27 Jun 2024, 19:22

Type Values Removed Values Added
First Time Webkitgtk webkitgtk\+
Webkitgtk
References () https://security.gentoo.org/glsa/202401-04 - () https://security.gentoo.org/glsa/202401-04 - Third Party Advisory
CPE cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*

05 Jan 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-04 -

29 Aug 2023, 18:05

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
First Time Redhat enterprise Linux
Redhat

27 Jul 2023, 04:15

Type Values Removed Values Added
Summary A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, Safari 16.5, tvOS 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

27 Jun 2023, 12:47

Type Values Removed Values Added
CWE CWE-416
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
References (MISC) https://support.apple.com/en-us/HT213762 - (MISC) https://support.apple.com/en-us/HT213762 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213757 - (MISC) https://support.apple.com/en-us/HT213757 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213761 - (MISC) https://support.apple.com/en-us/HT213761 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213758 - (MISC) https://support.apple.com/en-us/HT213758 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213765 - (MISC) https://support.apple.com/en-us/HT213765 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213764 - (MISC) https://support.apple.com/en-us/HT213764 - Release Notes, Vendor Advisory
First Time Apple
Apple tvos
Apple watchos
Apple safari
Apple iphone Os
Apple ipados
Apple macos
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

23 Jun 2023, 19:24

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-23 18:15

Updated : 2025-02-28 14:53


NVD link : CVE-2023-32373

Mitre link : CVE-2023-32373

CVE.ORG link : CVE-2023-32373


JSON object : View

Products Affected

apple

  • watchos
  • iphone_os
  • ipados
  • safari
  • macos
  • tvos

redhat

  • enterprise_linux

webkitgtk

  • webkitgtk\+
CWE
CWE-416

Use After Free