CVE-2023-32423Classic Buffer Overflow in Apple IOS AND Ipados

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 64.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 23

Description

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages11 packages

CVEListV5apple/tvosunspecified16.5
NVDapple/tvos< 16.5
CVEListV5apple/macosunspecified13.4
NVDapple/macos13.013.4
CVEListV5apple/safariunspecified16.5

🔴Vulnerability Details

3
GHSA
GHSA-4f23-rq6h-3p55: A buffer overflow issue was addressed with improved memory handling2023-06-23
CVEList
CVE-2023-32423: A buffer overflow issue was addressed with improved memory handling2023-06-23
VulnCheck
Apple safari Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')2023

📋Vendor Advisories

5
Apple
CVE-2023-32423: Safari 16.52023-05-18
Apple
CVE-2023-32423: iOS 16.5 and iPadOS 16.52023-05-18
Apple
CVE-2023-32423: watchOS 9.52023-05-18
Apple
CVE-2023-32423: tvOS 16.52023-05-18
Apple
CVE-2023-32423: macOS Ventura 13.42023-05-18
CVE-2023-32423 — Classic Buffer Overflow in Apple | cvebase