CVE-2023-32387Use After Free in Apple Macos

CWE-416Use After Free7 documents4 sources
Severity
9.8CRITICALNVD
EPSS
2.7%
top 14.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 23
Latest updateJul 13

Description

A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. A remote attacker may be able to cause unexpected app termination or arbitrary code execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

Appleapple/macos_monterey12.6.6
CVEListV5apple/macosunspecified13.4+2
NVDapple/macos11.0.011.7.7+2
Appleapple/macos_big_sur11.7.7

🔴Vulnerability Details

1
GHSA
GHSA-pxjc-2pxw-qcpg: A use-after-free issue was addressed with improved memory management2023-06-23

📋Vendor Advisories

3
Apple
CVE-2023-32387: macOS Ventura 13.42023-05-18
Apple
CVE-2023-32387: macOS Monterey 12.6.62023-05-18
Apple
CVE-2023-32387: macOS Big Sur 11.7.72023-05-18

🕵️Threat Intelligence

2
Talos
Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation2023-07-13
Talos
Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation2023-07-13