CVE-2023-32435

A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

20 Dec 2024, 17:49

Type Values Removed Values Added
References () https://support.apple.com/en-us/HT213670 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213670 - Vendor Advisory
References () https://support.apple.com/en-us/HT213671 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213671 - Vendor Advisory
References () https://support.apple.com/en-us/HT213676 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213676 - Vendor Advisory
References () https://support.apple.com/en-us/HT213811 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213811 - Vendor Advisory

21 Nov 2024, 08:03

Type Values Removed Values Added
References () https://support.apple.com/en-us/HT213670 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213670 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213671 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213671 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213676 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213676 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213811 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213811 - Release Notes, Vendor Advisory

27 Jul 2023, 04:15

Type Values Removed Values Added
Summary This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3, Safari 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.

26 Jul 2023, 23:15

Type Values Removed Values Added
Summary A memory corruption issue was addressed with improved state management. This issue is fixed in Safari 16.4, iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3, Safari 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2023/06/29/1', 'name': '[oss-security] 20230629 WebKitGTK and WPE WebKit Security Advisory WSA-2023-0005', 'tags': ['Mailing List'], 'refsource': 'MLIST'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Jul/5', 'name': '20230707 APPLE-SA-2023-06-21-3 iOS 15.7.7 and iPadOS 15.7.7', 'tags': [], 'refsource': 'FULLDISC'}

07 Jul 2023, 20:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jul/5 -

30 Jun 2023, 07:32

Type Values Removed Values Added
First Time Apple
Apple safari
Apple iphone Os
Apple ipados
Apple macos
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-787
References (MISC) https://support.apple.com/en-us/HT213671 - (MISC) https://support.apple.com/en-us/HT213671 - Release Notes, Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2023/06/29/1 - (MLIST) http://www.openwall.com/lists/oss-security/2023/06/29/1 - Mailing List
References (MISC) https://support.apple.com/en-us/HT213670 - (MISC) https://support.apple.com/en-us/HT213670 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213676 - (MISC) https://support.apple.com/en-us/HT213676 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213811 - (MISC) https://support.apple.com/en-us/HT213811 - Release Notes, Vendor Advisory

29 Jun 2023, 15:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2023/06/29/1 -

23 Jun 2023, 19:24

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-23 18:15

Updated : 2024-12-20 17:49


NVD link : CVE-2023-32435

Mitre link : CVE-2023-32435

CVE.ORG link : CVE-2023-32435


JSON object : View

Products Affected

apple

  • ipados
  • iphone_os
  • macos
  • safari
CWE
CWE-787

Out-of-bounds Write