CVE-2019-8828 (GCVE-0-2019-8828)
Vulnerability from
Published
2020-10-27 19:53
Modified
2024-08-04 21:31
Severity ?
EPSS score ?
Summary
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3 and iPadOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, tvOS 13.3. An application may be able to execute arbitrary code with kernel privileges.
References
▼ | URL | Tags |
---|---|---|
https://support.apple.com/en-us/HT210785 | x_refsource_MISC | |
https://support.apple.com/en-us/HT210788 | x_refsource_MISC | |
https://support.apple.com/en-us/HT210789 | x_refsource_MISC | |
https://support.apple.com/en-us/HT210790 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:31:37.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT210785" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT210788" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT210789" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT210790" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "iOS and iPadOS", "vendor": "Apple", "versions": [ { "lessThan": "13.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "10.15", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "6.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "13.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3 and iPadOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, tvOS 13.3. An application may be able to execute arbitrary code with kernel privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "An application may be able to execute arbitrary code with kernel privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-27T19:53:41", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT210785" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT210788" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT210789" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT210790" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2019-8828", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "iOS and iPadOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "13.3" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.15" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.1" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "13.3" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3 and iPadOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, tvOS 13.3. An application may be able to execute arbitrary code with kernel privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "An application may be able to execute arbitrary code with kernel privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT210785", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT210785" }, { "name": "https://support.apple.com/en-us/HT210788", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT210788" }, { "name": "https://support.apple.com/en-us/HT210789", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT210789" }, { "name": "https://support.apple.com/en-us/HT210790", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT210790" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2019-8828", "datePublished": "2020-10-27T19:53:41", "dateReserved": "2019-02-18T00:00:00", "dateUpdated": "2024-08-04T21:31:37.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-1851 (GCVE-0-2021-1851)
Vulnerability from
Published
2021-09-08 14:44
Modified
2024-08-03 16:25
Severity ?
EPSS score ?
Summary
A logic issue was addressed with improved state management. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. An application may be able to execute arbitrary code with kernel privileges.
References
▼ | URL | Tags |
---|---|---|
https://support.apple.com/en-us/HT212317 | x_refsource_MISC | |
https://support.apple.com/en-us/HT212323 | x_refsource_MISC | |
https://support.apple.com/en-us/HT212324 | x_refsource_MISC | |
https://support.apple.com/en-us/HT212325 | x_refsource_MISC | |
https://support.apple.com/en-us/HT212326 | x_refsource_MISC | |
https://support.apple.com/en-us/HT212327 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:25:05.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT212317" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT212323" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT212324" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT212325" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT212326" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT212327" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "iOS and iPadOS", "vendor": "Apple", "versions": [ { "lessThan": "14.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "14.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "watchOS", "vendor": "Apple", "versions": [ { "lessThan": "7.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "11.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "2021", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "2021", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved state management. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. An application may be able to execute arbitrary code with kernel privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "An application may be able to execute arbitrary code with kernel privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-08T14:44:35", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT212317" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT212323" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT212324" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT212325" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT212326" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT212327" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2021-1851", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "iOS and iPadOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "14.5" } ] } }, { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "14.5" } ] } }, { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "11.3" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2021" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2021" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A logic issue was addressed with improved state management. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. An application may be able to execute arbitrary code with kernel privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "An application may be able to execute arbitrary code with kernel privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT212317", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212317" }, { "name": "https://support.apple.com/en-us/HT212323", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212323" }, { "name": "https://support.apple.com/en-us/HT212324", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212324" }, { "name": "https://support.apple.com/en-us/HT212325", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212325" }, { "name": "https://support.apple.com/en-us/HT212326", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212326" }, { "name": "https://support.apple.com/en-us/HT212327", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212327" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2021-1851", "datePublished": "2021-09-08T14:44:35", "dateReserved": "2020-12-08T00:00:00", "dateUpdated": "2024-08-03T16:25:05.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-7643 (GCVE-0-2016-7643)
Vulnerability from
Published
2017-02-20 08:35
Modified
2024-08-06 02:04
Severity ?
EPSS score ?
Summary
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "ImageIO" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted web site.
References
▼ | URL | Tags |
---|---|---|
https://support.apple.com/HT207487 | x_refsource_CONFIRM | |
https://support.apple.com/HT207422 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/94905 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1037469 | vdb-entry, x_refsource_SECTRACK | |
https://support.apple.com/HT207423 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:04:55.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT207487" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT207422" }, { "name": "94905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94905" }, { "name": "1037469", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037469" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT207423" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the \"ImageIO\" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted web site." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-26T09:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT207487" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT207422" }, { "name": "94905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94905" }, { "name": "1037469", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037469" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT207423" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2016-7643", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the \"ImageIO\" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted web site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT207487", "refsource": "CONFIRM", "url": "https://support.apple.com/HT207487" }, { "name": "https://support.apple.com/HT207422", "refsource": "CONFIRM", "url": "https://support.apple.com/HT207422" }, { "name": "94905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94905" }, { "name": "1037469", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037469" }, { "name": "https://support.apple.com/HT207423", "refsource": "CONFIRM", "url": "https://support.apple.com/HT207423" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2016-7643", "datePublished": "2017-02-20T08:35:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T02:04:55.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-13861 (GCVE-0-2017-13861)
Vulnerability from
Published
2017-12-25 21:00
Modified
2024-08-05 19:13
Severity ?
EPSS score ?
Summary
An issue was discovered in certain Apple products. iOS before 11.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "IOSurface" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/102134 | vdb-entry, x_refsource_BID | |
https://support.apple.com/HT208327 | x_refsource_CONFIRM | |
https://www.exploit-db.com/exploits/43320/ | exploit, x_refsource_EXPLOIT-DB | |
https://support.apple.com/HT208325 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039953 | vdb-entry, x_refsource_SECTRACK | |
https://support.apple.com/HT208334 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039952 | vdb-entry, x_refsource_SECTRACK | |
http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:13:40.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "102134", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102134" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208327" }, { "name": "43320", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43320/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208325" }, { "name": "1039953", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039953" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208334" }, { "name": "1039952", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039952" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-12-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the \"IOSurface\" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-02T16:06:03", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "102134", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102134" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208327" }, { "name": "43320", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43320/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208325" }, { "name": "1039953", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039953" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208334" }, { "name": "1039952", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039952" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2017-13861", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in certain Apple products. iOS before 11.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the \"IOSurface\" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "102134", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102134" }, { "name": "https://support.apple.com/HT208327", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208327" }, { "name": "43320", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43320/" }, { "name": "https://support.apple.com/HT208325", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208325" }, { "name": "1039953", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039953" }, { "name": "https://support.apple.com/HT208334", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208334" }, { "name": "1039952", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039952" }, { "name": "http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2017-13861", "datePublished": "2017-12-25T21:00:00", "dateReserved": "2017-08-30T00:00:00", "dateUpdated": "2024-08-05T19:13:40.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-8688 (GCVE-0-2019-8688)
Vulnerability from
Published
2019-12-18 17:33
Modified
2024-08-04 21:24
Severity ?
EPSS score ?
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://support.apple.com/HT210353 | x_refsource_MISC | |
https://support.apple.com/HT210346 | x_refsource_MISC | |
https://support.apple.com/HT210348 | x_refsource_MISC | |
https://support.apple.com/HT210351 | x_refsource_MISC | |
https://support.apple.com/HT210355 | x_refsource_MISC | |
https://support.apple.com/HT210356 | x_refsource_MISC | |
https://support.apple.com/HT210357 | x_refsource_MISC | |
https://support.apple.com/HT210358 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Apple | iOS |
Version: unspecified < iOS 12.4 |
||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:24:29.525Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/HT210353" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/HT210346" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/HT210348" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/HT210351" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/HT210355" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/HT210356" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/HT210357" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/HT210358" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "iOS", "vendor": "Apple", "versions": [ { "lessThan": "iOS 12.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "macOS Mojave 10.14.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "tvOS 12.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "watchOS", "vendor": "Apple", "versions": [ { "lessThan": "watchOS 5.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Safari", "vendor": "Apple", "versions": [ { "lessThan": "Safari 12.1.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iTunes for Windows", "vendor": "Apple", "versions": [ { "lessThan": "iTunes for Windows 12.9.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iCloud for Windows", "vendor": "Apple", "versions": [ { "lessThan": "iCloud for Windows 7.13", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iCloud for Windows (Microsoft Store)", "vendor": "Apple", "versions": [ { "lessThan": "iCloud for Windows 10.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Processing maliciously crafted web content may lead to arbitrary code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-18T17:33:21", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/HT210353" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/HT210346" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/HT210348" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/HT210351" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/HT210355" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/HT210356" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/HT210357" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/HT210358" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2019-8688", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "iOS 12.4" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "macOS Mojave 10.14.6" } ] } }, { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "tvOS 12.4" } ] } }, { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "watchOS 5.3" } ] } }, { "product_name": "Safari", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Safari 12.1.2" } ] } }, { "product_name": "iTunes for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "iTunes for Windows 12.9.6" } ] } }, { "product_name": "iCloud for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "iCloud for Windows 7.13" } ] } }, { "product_name": "iCloud for Windows (Microsoft Store)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "iCloud for Windows 10.6" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing maliciously crafted web content may lead to arbitrary code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT210353", "refsource": "MISC", "url": "https://support.apple.com/HT210353" }, { "name": "https://support.apple.com/HT210346", "refsource": "MISC", "url": "https://support.apple.com/HT210346" }, { "name": "https://support.apple.com/HT210348", "refsource": "MISC", "url": "https://support.apple.com/HT210348" }, { "name": "https://support.apple.com/HT210351", "refsource": "MISC", "url": "https://support.apple.com/HT210351" }, { "name": "https://support.apple.com/HT210355", "refsource": "MISC", "url": "https://support.apple.com/HT210355" }, { "name": "https://support.apple.com/HT210356", "refsource": "MISC", "url": "https://support.apple.com/HT210356" }, { "name": "https://support.apple.com/HT210357", "refsource": "MISC", "url": "https://support.apple.com/HT210357" }, { "name": "https://support.apple.com/HT210358", "refsource": "MISC", "url": "https://support.apple.com/HT210358" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2019-8688", "datePublished": "2019-12-18T17:33:21", "dateReserved": "2019-02-18T00:00:00", "dateUpdated": "2024-08-04T21:24:29.525Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-40520 (GCVE-0-2023-40520)
Vulnerability from
Published
2023-09-26 20:14
Modified
2025-02-13 17:08
Severity ?
EPSS score ?
Summary
The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to access edited photos saved to a temporary directory.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213938" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213936" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213937" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Oct/10" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Oct/8" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Oct/9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-40520", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:33:06.195714Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:33:15.781Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "iOS and iPadOS", "vendor": "Apple", "versions": [ { "lessThan": "17", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "17", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "watchOS", "vendor": "Apple", "versions": [ { "lessThan": "10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to access edited photos saved to a temporary directory." } ], "problemTypes": [ { "descriptions": [ { "description": "An app may be able to access edited photos saved to a temporary directory", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-03T05:07:43.558Z", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "url": "https://support.apple.com/en-us/HT213938" }, { "url": "https://support.apple.com/en-us/HT213936" }, { "url": "https://support.apple.com/en-us/HT213937" }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/10" }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/8" }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/9" } ] } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2023-40520", "datePublished": "2023-09-26T20:14:51.609Z", "dateReserved": "2023-08-14T21:26:18.710Z", "dateUpdated": "2025-02-13T17:08:28.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-5939 (GCVE-0-2015-5939)
Vulnerability from
Published
2015-10-23 21:00
Modified
2024-08-06 07:06
Severity ?
EPSS score ?
Summary
ImageIO in Apple iOS before 9.1, OS X before 10.11.1, and watchOS before 2.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted metadata in an image, a different vulnerability than CVE-2015-5935, CVE-2015-5936, and CVE-2015-5937.
References
▼ | URL | Tags |
---|---|---|
http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html | vendor-advisory, x_refsource_APPLE | |
http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html | vendor-advisory, x_refsource_APPLE | |
https://support.apple.com/HT205375 | x_refsource_CONFIRM | |
http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html | vendor-advisory, x_refsource_APPLE | |
https://support.apple.com/HT205370 | x_refsource_CONFIRM | |
https://support.apple.com/HT205378 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1033929 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:06:34.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2015-10-21-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html" }, { "name": "APPLE-SA-2015-10-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205375" }, { "name": "APPLE-SA-2015-10-21-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205370" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205378" }, { "name": "1033929", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033929" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-21T00:00:00", "descriptions": [ { "lang": "en", "value": "ImageIO in Apple iOS before 9.1, OS X before 10.11.1, and watchOS before 2.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted metadata in an image, a different vulnerability than CVE-2015-5935, CVE-2015-5936, and CVE-2015-5937." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-22T18:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2015-10-21-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html" }, { "name": "APPLE-SA-2015-10-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205375" }, { "name": "APPLE-SA-2015-10-21-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205370" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205378" }, { "name": "1033929", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033929" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2015-5939", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ImageIO in Apple iOS before 9.1, OS X before 10.11.1, and watchOS before 2.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted metadata in an image, a different vulnerability than CVE-2015-5935, CVE-2015-5936, and CVE-2015-5937." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2015-10-21-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html" }, { "name": "APPLE-SA-2015-10-21-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html" }, { "name": "https://support.apple.com/HT205375", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205375" }, { "name": "APPLE-SA-2015-10-21-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html" }, { "name": "https://support.apple.com/HT205370", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205370" }, { "name": "https://support.apple.com/HT205378", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205378" }, { "name": "1033929", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033929" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2015-5939", "datePublished": "2015-10-23T21:00:00", "dateReserved": "2015-08-06T00:00:00", "dateUpdated": "2024-08-06T07:06:34.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-2502 (GCVE-0-2017-2502)
Vulnerability from
Published
2017-05-22 04:54
Modified
2024-08-05 13:55
Severity ?
EPSS score ?
Summary
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "CoreAudio" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038484 | vdb-entry, x_refsource_SECTRACK | |
https://support.apple.com/HT207797 | x_refsource_CONFIRM | |
https://support.apple.com/HT207800 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/98468 | vdb-entry, x_refsource_BID | |
https://support.apple.com/HT207798 | x_refsource_CONFIRM | |
https://support.apple.com/HT207801 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:55:06.009Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038484", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038484" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT207797" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT207800" }, { "name": "98468", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98468" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT207798" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT207801" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-07T09:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "1038484", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038484" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT207797" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT207800" }, { "name": "98468", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98468" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT207798" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT207801" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2017-2502", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1038484", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038484" }, { "name": "https://support.apple.com/HT207797", "refsource": "CONFIRM", "url": "https://support.apple.com/HT207797" }, { "name": "https://support.apple.com/HT207800", "refsource": "CONFIRM", "url": "https://support.apple.com/HT207800" }, { "name": "98468", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98468" }, { "name": "https://support.apple.com/HT207798", "refsource": "CONFIRM", "url": "https://support.apple.com/HT207798" }, { "name": "https://support.apple.com/HT207801", "refsource": "CONFIRM", "url": "https://support.apple.com/HT207801" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2017-2502", "datePublished": "2017-05-22T04:54:00", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-08-05T13:55:06.009Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-32944 (GCVE-0-2022-32944)
Vulnerability from
Published
2022-11-01 00:00
Modified
2024-08-03 07:54
Severity ?
EPSS score ?
Summary
A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16, macOS Monterey 12.6.1, macOS Big Sur 11.7.1. An app may be able to execute arbitrary code with kernel privileges.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:54:03.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213488" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213493" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213494" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213489" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213492" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213491" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213490" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "13", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "16.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "11.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "16.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "12.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "15.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "watchOS", "vendor": "Apple", "versions": [ { "lessThan": "9.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16, macOS Monterey 12.6.1, macOS Big Sur 11.7.1. An app may be able to execute arbitrary code with kernel privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "An app may be able to execute arbitrary code with kernel privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-01T00:00:00", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "url": "https://support.apple.com/en-us/HT213488" }, { "url": "https://support.apple.com/en-us/HT213493" }, { "url": "https://support.apple.com/en-us/HT213494" }, { "url": "https://support.apple.com/en-us/HT213489" }, { "url": "https://support.apple.com/en-us/HT213492" }, { "url": "https://support.apple.com/en-us/HT213491" }, { "url": "https://support.apple.com/en-us/HT213490" } ] } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2022-32944", "datePublished": "2022-11-01T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T07:54:03.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-9938 (GCVE-0-2020-9938)
Vulnerability from
Published
2020-10-22 18:05
Modified
2024-08-04 10:50
Severity ?
EPSS score ?
Summary
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://support.apple.com/kb/HT211289 | x_refsource_MISC | |
https://support.apple.com/kb/HT211288 | x_refsource_MISC | |
https://support.apple.com/kb/HT211290 | x_refsource_MISC | |
https://support.apple.com/kb/HT211291 | x_refsource_MISC | |
https://support.apple.com/kb/HT211293 | x_refsource_MISC | |
https://support.apple.com/kb/HT211294 | x_refsource_MISC | |
https://support.apple.com/kb/HT211295 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Apple | iOS |
Version: unspecified < iOS 13.6 and iPadOS 13.6 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:56.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT211289" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT211288" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT211290" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT211291" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT211293" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT211294" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT211295" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "iOS", "vendor": "Apple", "versions": [ { "lessThan": "iOS 13.6 and iPadOS 13.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "macOS Catalina 10.15.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "tvOS 13.4.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "watchOS", "vendor": "Apple", "versions": [ { "lessThan": "watchOS 6.2.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iTunes for Windows", "vendor": "Apple", "versions": [ { "lessThan": "iTunes 12.10.8 for Windows", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iCloud for Windows", "vendor": "Apple", "versions": [ { "lessThan": "iCloud for Windows 11.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iCloud for Windows (Legacy)", "vendor": "Apple", "versions": [ { "lessThan": "iCloud for Windows 7.20", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Processing a maliciously crafted image may lead to arbitrary code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-22T18:05:51", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT211289" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT211288" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT211290" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT211291" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT211293" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT211294" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT211295" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2020-9938", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "iOS 13.6 and iPadOS 13.6" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "macOS Catalina 10.15.6" } ] } }, { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "tvOS 13.4.8" } ] } }, { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "watchOS 6.2.8" } ] } }, { "product_name": "iTunes for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "iTunes 12.10.8 for Windows" } ] } }, { "product_name": "iCloud for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "iCloud for Windows 11.3" } ] } }, { "product_name": "iCloud for Windows (Legacy)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "iCloud for Windows 7.20" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing a maliciously crafted image may lead to arbitrary code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/kb/HT211289", "refsource": "MISC", "url": "https://support.apple.com/kb/HT211289" }, { "name": "https://support.apple.com/kb/HT211288", "refsource": "MISC", "url": "https://support.apple.com/kb/HT211288" }, { "name": "https://support.apple.com/kb/HT211290", "refsource": "MISC", "url": "https://support.apple.com/kb/HT211290" }, { "name": "https://support.apple.com/kb/HT211291", "refsource": "MISC", "url": "https://support.apple.com/kb/HT211291" }, { "name": "https://support.apple.com/kb/HT211293", "refsource": "MISC", "url": "https://support.apple.com/kb/HT211293" }, { "name": "https://support.apple.com/kb/HT211294", "refsource": "MISC", "url": "https://support.apple.com/kb/HT211294" }, { "name": "https://support.apple.com/kb/HT211295", "refsource": "MISC", "url": "https://support.apple.com/kb/HT211295" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2020-9938", "datePublished": "2020-10-22T18:05:51", "dateReserved": "2020-03-02T00:00:00", "dateUpdated": "2024-08-04T10:50:56.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
displaying 1 - 10 organizations in total 19