Action not permitted
Modal body text goes here.
CVE-2022-42841
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
product-security@apple.com | http://seclists.org/fulldisclosure/2022/Dec/23 | Mailing List, Third Party Advisory | |
product-security@apple.com | http://seclists.org/fulldisclosure/2022/Dec/24 | Mailing List, Third Party Advisory | |
product-security@apple.com | http://seclists.org/fulldisclosure/2022/Dec/25 | Mailing List, Third Party Advisory | |
product-security@apple.com | https://support.apple.com/en-us/HT213532 | Release Notes, Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/HT213533 | Release Notes, Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/HT213534 | Release Notes, Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:04.868Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213532" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213534" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT213533" }, { "name": "20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Dec/25" }, { "name": "20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Dec/23" }, { "name": "20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Dec/24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "11.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "13.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "12.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Processing a maliciously crafted package may lead to arbitrary code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-21T00:00:00", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "url": "https://support.apple.com/en-us/HT213532" }, { "url": "https://support.apple.com/en-us/HT213534" }, { "url": "https://support.apple.com/en-us/HT213533" }, { "name": "20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/Dec/25" }, { "name": "20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/Dec/23" }, { "name": "20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/Dec/24" } ] } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2022-42841", "datePublished": "2022-12-15T00:00:00", "dateReserved": "2022-10-11T00:00:00", "dateUpdated": "2024-08-03T13:19:04.868Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-42841\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2022-12-15T19:15:23.730\",\"lastModified\":\"2023-01-09T17:00:32.883\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Se solucion\u00f3 un problema de confusi\u00f3n de tipos con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. El procesamiento de un paquete creado con fines malintencionados puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-843\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndExcluding\":\"11.7.2\",\"matchCriteriaId\":\"5867A268-292B-4DB2-8CA7-DE06D7125E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.6.2\",\"matchCriteriaId\":\"9E3665C4-8E18-4653-9F23-6A49AE0B3CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"669C9F3E-1DE9-4770-B611-04404D3A19D3\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2022/Dec/23\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Dec/24\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Dec/25\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213532\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213533\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213534\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}" } }
gsd-2022-42841
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-42841", "description": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution.", "id": "GSD-2022-42841" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-42841" ], "details": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution.", "id": "GSD-2022-42841", "modified": "2023-12-13T01:19:10.754219Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2022-42841", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "11.7" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "13.1" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "12.6" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing a maliciously crafted package may lead to arbitrary code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT213532", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213532" }, { "name": "https://support.apple.com/en-us/HT213534", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213534" }, { "name": "https://support.apple.com/en-us/HT213533", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213533" }, { "name": "20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/Dec/25" }, { "name": "20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/Dec/23" }, { "name": "20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/Dec/24" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.7.2", "versionStartIncluding": "11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.6.2", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2022-42841" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-843" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT213532", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213532" }, { "name": "https://support.apple.com/en-us/HT213533", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213533" }, { "name": "https://support.apple.com/en-us/HT213534", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213534" }, { "name": "20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Dec/23" }, { "name": "20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Dec/24" }, { "name": "20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Dec/25" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-01-09T17:00Z", "publishedDate": "2022-12-15T19:15Z" } } }
var-202212-1268
Vulnerability from variot
A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution. apple's macOS contains a type confusion vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2022-12-13-4 macOS Ventura 13.1
macOS Ventura 13.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213532.
Accounts Available for: macOS Ventura Impact: A user may be able to view sensitive user information Description: This issue was addressed with improved data protection. CVE-2022-42843: Mickey Jin (@patch1t)
AMD Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2022-42847: ABC Research s.r.o.
AppleMobileFileIntegrity Available for: macOS Ventura Impact: An app may be able to bypass Privacy preferences Description: This issue was addressed by enabling hardened runtime. CVE-2022-42865: Wojciech Reguła (@_r3ggi) of SecuRing
Bluetooth Available for: macOS Ventura Impact: An app may be able to disclose kernel memory Description: The issue was addressed with improved memory handling. CVE-2022-42854: Pan ZhenPeng (@Peterpan0927) of STAR Labs SG Pte. Ltd. (@starlabs_sg)
Boot Camp Available for: macOS Ventura Impact: An app may be able to modify protected parts of the file system Description: An access issue was addressed with improved access restrictions. CVE-2022-42853: Mickey Jin (@patch1t) of Trend Micro
CoreServices Available for: macOS Ventura Impact: An app may be able to bypass Privacy preferences Description: Multiple issues were addressed by removing the vulnerable code. CVE-2022-42859: Mickey Jin (@patch1t), Csaba Fitzl (@theevilbit) of Offensive Security
DriverKit Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-46693: Mickey Jin (@patch1t)
IOHIDFamily Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved state handling. CVE-2022-42864: Tommy Muir (@Muirey03)
IOMobileFrameBuffer Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2022-46690: John Aakerblom (@jaakerblom)
IOMobileFrameBuffer Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds access issue was addressed with improved bounds checking. CVE-2022-46697: John Aakerblom (@jaakerblom) and Antonio Zekic (@antoniozekic)
iTunes Store Available for: macOS Ventura Impact: A remote user may be able to cause unexpected app termination or arbitrary code execution Description: An issue existed in the parsing of URLs. CVE-2022-42837: Weijia Dai (@dwj1210) of Momo Security
Kernel Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with additional validation. CVE-2022-46689: Ian Beer of Google Project Zero
Kernel Available for: macOS Ventura Impact: Connecting to a malicious NFS server may lead to arbitrary code execution with kernel privileges Description: The issue was addressed with improved bounds checks. CVE-2022-46701: Felix Poulin-Belanger
Kernel Available for: macOS Ventura Impact: A remote user may be able to cause kernel code execution Description: The issue was addressed with improved memory handling. CVE-2022-42842: pattern-f (@pattern_F_) of Ant Security Light-Year Lab
Kernel Available for: macOS Ventura Impact: An app may be able to break out of its sandbox Description: This issue was addressed with improved checks. CVE-2022-42861: pattern-f (@pattern_F_) of Ant Security Light-Year Lab
Kernel Available for: macOS Ventura Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-42845: Adam Doupé of ASU SEFCOM
Photos Available for: macOS Ventura Impact: Shake-to-undo may allow a deleted photo to be re-surfaced without authentication Description: The issue was addressed with improved bounds checks. CVE-2022-32943: an anonymous researcher
ppp Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-42840: an anonymous researcher
Preferences Available for: macOS Ventura Impact: An app may be able to use arbitrary entitlements Description: A logic issue was addressed with improved state management. CVE-2022-42855: Ivan Fratric of Google Project Zero
Printing Available for: macOS Ventura Impact: An app may be able to bypass Privacy preferences Description: This issue was addressed by removing the vulnerable code. CVE-2022-42862: Mickey Jin (@patch1t)
Ruby Available for: macOS Ventura Impact: A remote user may be able to cause unexpected app termination or arbitrary code execution Description: This issue was addressed with improved checks. CVE-2022-24836 CVE-2022-29181
Safari Available for: macOS Ventura Impact: Visiting a website that frames malicious content may lead to UI spoofing Description: A spoofing issue existed in the handling of URLs. CVE-2022-46695: KirtiKumar Anandrao Ramchandani
Weather Available for: macOS Ventura Impact: An app may be able to read sensitive location information Description: The issue was addressed with improved handling of caches. CVE-2022-42866: an anonymous researcher
WebKit Available for: macOS Ventura Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. WebKit Bugzilla: 245521 CVE-2022-42867: Maddie Stone of Google Project Zero
WebKit Available for: macOS Ventura Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory consumption issue was addressed with improved memory handling. WebKit Bugzilla: 245466 CVE-2022-46691: an anonymous researcher
WebKit Available for: macOS Ventura Impact: Processing maliciously crafted web content may bypass Same Origin Policy Description: A logic issue was addressed with improved state management. WebKit Bugzilla: 246783 CVE-2022-46692: KirtiKumar Anandrao Ramchandani
WebKit Available for: macOS Ventura Impact: Processing maliciously crafted web content may result in the disclosure of process memory Description: The issue was addressed with improved memory handling. CVE-2022-42852: hazbinhotel working with Trend Micro Zero Day Initiative
WebKit Available for: macOS Ventura Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. WebKit Bugzilla: 246942 CVE-2022-46696: Samuel Groß of Google V8 Security WebKit Bugzilla: 247562 CVE-2022-46700: Samuel Groß of Google V8 Security
WebKit Available for: macOS Ventura Impact: Processing maliciously crafted web content may disclose sensitive user information Description: A logic issue was addressed with improved checks. CVE-2022-46698: Dohyun Lee (@l33d0hyun) of SSD Secure Disclosure Labs & DNSLab, Korea Univ. WebKit Bugzilla: 247420 CVE-2022-46699: Samuel Groß of Google V8 Security WebKit Bugzilla: 244622 CVE-2022-42863: an anonymous researcher
WebKit Available for: macOS Ventura Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1. CVE-2022-42841: Thijs Alkemade (@xnyhps) of Computest Sector 7
Additional recognition
Kernel We would like to acknowledge Zweig of Kunlun Lab for their assistance.
Lock Screen We would like to acknowledge Kevin Mann for their assistance.
Safari Extensions We would like to acknowledge Oliver Dunk and Christian R. of 1Password for their assistance.
WebKit We would like to acknowledge an anonymous researcher and scarlet for their assistance.
macOS Ventura 13.1 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222.
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEBP+4DupqR5Sgt1DB4RjMIDkeNxkFAmOZFYAACgkQ4RjMIDke Nxk1zRAAuqDsK19ODzl+oIO6xYMDcbiQV/ibvU9uwLtwTR8Y2wLga9V/vaaPTS6z qRkTivKEfdLMVW8Xlzl1jb+BMS0+dIjYrPAFatU8A5H2A3MLY5Trl9tTs+D8BgQJ reLRAyR6qJVwu+VMMjgrUxkQliPNYeumrmLwmKJdByYPzv4GLY5bOIf6siUAIJdB vs2zzcq6+BnoJkS1iYa+Ub5S3bSryR2i8vrSit6PcYBtLKHxUJaK2YBdA8LoqB4J wenkEaEhyilm0bpyyF0VxDuvOcotqrGa2ikScrik/N/NueMqDi9duo9kKKVia0xa Gx2cYLNDG10KBmz9w9B8YC6lNa6t7M5zmCYn8TmXTfndd7fCYbYajZNT0WxIYteK sXYPkVpqEd4KVZxtQ3MfHlx5y4FwnqBkLACnfsNCs4KatbJPEg9Qy9Mn2ymi/9He UoVt3XnQVhAgGIRV2qezjV9r0rtgnWpSKvFd9LSDcB9F6b/bzRipbxVnqdWCL1If ymeeEY8BJ7WJnFqgXzRo42+4bp4R67iNH+Z/JjUy/Z7C3f2O66fFZu2pNL1vLILA Wi/dprF13SjqCIavwWPbVL8UvfaAwBz53y38gwei6eSdsEO383r0XIIKjErGbWm6 hqHq/QKTWHQZqUFj4kUb4Ajw8Qe0j0qSrCLt4Wl11u/0r5hTRyI= =C5EK -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-1268", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "macos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "11.7.2" }, { "model": "macos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.6.2" }, { "model": "macos", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "11.0" }, { "model": "macos", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "13.0" }, { "model": "macos", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "12.0.0" }, { "model": "macos", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "11.0 that\u0027s all 11.7.2" }, { "model": "macos", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "12.0.0 that\u0027s all 12.6.2" }, { "model": "macos", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "13.0" }, { "model": "macos", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023515" }, { "db": "NVD", "id": "CVE-2022-42841" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.7.2", "versionStartIncluding": "11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.6.2", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-42841" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "PACKETSTORM", "id": "170316" }, { "db": "PACKETSTORM", "id": "170315" }, { "db": "PACKETSTORM", "id": "170314" } ], "trust": 0.3 }, "cve": "CVE-2022-42841", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-42841", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-42841", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-3151", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023515" }, { "db": "NVD", "id": "CVE-2022-42841" }, { "db": "CNNVD", "id": "CNNVD-202212-3151" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution. apple\u0027s macOS contains a type confusion vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2022-12-13-4 macOS Ventura 13.1\n\nmacOS Ventura 13.1 addresses the following issues. \nInformation about the security content is also available at\nhttps://support.apple.com/HT213532. \n\nAccounts\nAvailable for: macOS Ventura\nImpact: A user may be able to view sensitive user information\nDescription: This issue was addressed with improved data protection. \nCVE-2022-42843: Mickey Jin (@patch1t)\n\nAMD\nAvailable for: macOS Ventura\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: An out-of-bounds write issue was addressed with improved\ninput validation. \nCVE-2022-42847: ABC Research s.r.o. \n\nAppleMobileFileIntegrity\nAvailable for: macOS Ventura\nImpact: An app may be able to bypass Privacy preferences\nDescription: This issue was addressed by enabling hardened runtime. \nCVE-2022-42865: Wojciech Regu\u0142a (@_r3ggi) of SecuRing\n\nBluetooth\nAvailable for: macOS Ventura\nImpact: An app may be able to disclose kernel memory\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-42854: Pan ZhenPeng (@Peterpan0927) of STAR Labs SG Pte. \nLtd. (@starlabs_sg)\n\nBoot Camp\nAvailable for: macOS Ventura\nImpact: An app may be able to modify protected parts of the file\nsystem\nDescription: An access issue was addressed with improved access\nrestrictions. \nCVE-2022-42853: Mickey Jin (@patch1t) of Trend Micro\n\nCoreServices\nAvailable for: macOS Ventura\nImpact: An app may be able to bypass Privacy preferences\nDescription: Multiple issues were addressed by removing the\nvulnerable code. \nCVE-2022-42859: Mickey Jin (@patch1t), Csaba Fitzl (@theevilbit) of\nOffensive Security\n\nDriverKit\nAvailable for: macOS Ventura\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-46693: Mickey Jin (@patch1t)\n\nIOHIDFamily\nAvailable for: macOS Ventura\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: A race condition was addressed with improved state\nhandling. \nCVE-2022-42864: Tommy Muir (@Muirey03)\n\nIOMobileFrameBuffer\nAvailable for: macOS Ventura\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: An out-of-bounds write issue was addressed with improved\ninput validation. \nCVE-2022-46690: John Aakerblom (@jaakerblom)\n\nIOMobileFrameBuffer\nAvailable for: macOS Ventura\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: An out-of-bounds access issue was addressed with\nimproved bounds checking. \nCVE-2022-46697: John Aakerblom (@jaakerblom) and Antonio Zekic\n(@antoniozekic)\n\niTunes Store\nAvailable for: macOS Ventura\nImpact: A remote user may be able to cause unexpected app termination\nor arbitrary code execution\nDescription: An issue existed in the parsing of URLs. \nCVE-2022-42837: Weijia Dai (@dwj1210) of Momo Security\n\nKernel\nAvailable for: macOS Ventura\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: A race condition was addressed with additional\nvalidation. \nCVE-2022-46689: Ian Beer of Google Project Zero\n\nKernel\nAvailable for: macOS Ventura\nImpact: Connecting to a malicious NFS server may lead to arbitrary\ncode execution with kernel privileges\nDescription: The issue was addressed with improved bounds checks. \nCVE-2022-46701: Felix Poulin-Belanger\n\nKernel\nAvailable for: macOS Ventura\nImpact: A remote user may be able to cause kernel code execution\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-42842: pattern-f (@pattern_F_) of Ant Security Light-Year\nLab\n\nKernel\nAvailable for: macOS Ventura\nImpact: An app may be able to break out of its sandbox\nDescription: This issue was addressed with improved checks. \nCVE-2022-42861: pattern-f (@pattern_F_) of Ant Security Light-Year\nLab\n\nKernel\nAvailable for: macOS Ventura\nImpact: An app with root privileges may be able to execute arbitrary\ncode with kernel privileges\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-42845: Adam Doup\u00e9 of ASU SEFCOM\n\nPhotos\nAvailable for: macOS Ventura\nImpact: Shake-to-undo may allow a deleted photo to be re-surfaced\nwithout authentication\nDescription: The issue was addressed with improved bounds checks. \nCVE-2022-32943: an anonymous researcher\n\nppp\nAvailable for: macOS Ventura\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-42840: an anonymous researcher\n\nPreferences\nAvailable for: macOS Ventura\nImpact: An app may be able to use arbitrary entitlements\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2022-42855: Ivan Fratric of Google Project Zero\n\nPrinting\nAvailable for: macOS Ventura\nImpact: An app may be able to bypass Privacy preferences\nDescription: This issue was addressed by removing the vulnerable\ncode. \nCVE-2022-42862: Mickey Jin (@patch1t)\n\nRuby\nAvailable for: macOS Ventura\nImpact: A remote user may be able to cause unexpected app termination\nor arbitrary code execution\nDescription: This issue was addressed with improved checks. \nCVE-2022-24836\nCVE-2022-29181\n\nSafari\nAvailable for: macOS Ventura\nImpact: Visiting a website that frames malicious content may lead to\nUI spoofing\nDescription: A spoofing issue existed in the handling of URLs. \nCVE-2022-46695: KirtiKumar Anandrao Ramchandani\n\nWeather\nAvailable for: macOS Ventura\nImpact: An app may be able to read sensitive location information\nDescription: The issue was addressed with improved handling of\ncaches. \nCVE-2022-42866: an anonymous researcher\n\nWebKit\nAvailable for: macOS Ventura\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nWebKit Bugzilla: 245521\nCVE-2022-42867: Maddie Stone of Google Project Zero\n\nWebKit\nAvailable for: macOS Ventura\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A memory consumption issue was addressed with improved\nmemory handling. \nWebKit Bugzilla: 245466\nCVE-2022-46691: an anonymous researcher\n\nWebKit\nAvailable for: macOS Ventura\nImpact: Processing maliciously crafted web content may bypass Same\nOrigin Policy\nDescription: A logic issue was addressed with improved state\nmanagement. \nWebKit Bugzilla: 246783\nCVE-2022-46692: KirtiKumar Anandrao Ramchandani\n\nWebKit\nAvailable for: macOS Ventura\nImpact: Processing maliciously crafted web content may result in the\ndisclosure of process memory\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-42852: hazbinhotel working with Trend Micro Zero Day\nInitiative\n\nWebKit\nAvailable for: macOS Ventura\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nWebKit Bugzilla: 246942\nCVE-2022-46696: Samuel Gro\u00df of Google V8 Security\nWebKit Bugzilla: 247562\nCVE-2022-46700: Samuel Gro\u00df of Google V8 Security\n\nWebKit\nAvailable for: macOS Ventura\nImpact: Processing maliciously crafted web content may disclose\nsensitive user information\nDescription: A logic issue was addressed with improved checks. \nCVE-2022-46698: Dohyun Lee (@l33d0hyun) of SSD Secure Disclosure Labs\n\u0026 DNSLab, Korea Univ. \nWebKit Bugzilla: 247420\nCVE-2022-46699: Samuel Gro\u00df of Google V8 Security\nWebKit Bugzilla: 244622\nCVE-2022-42863: an anonymous researcher\n\nWebKit\nAvailable for: macOS Ventura\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution. Apple is aware of a report that this issue\nmay have been actively exploited against versions of iOS released\nbefore iOS 15.1. \nCVE-2022-42841: Thijs Alkemade (@xnyhps) of Computest Sector 7\n\nAdditional recognition\n\nKernel\nWe would like to acknowledge Zweig of Kunlun Lab for their\nassistance. \n\nLock Screen\nWe would like to acknowledge Kevin Mann for their assistance. \n\nSafari Extensions\nWe would like to acknowledge Oliver Dunk and Christian R. of\n1Password for their assistance. \n\nWebKit\nWe would like to acknowledge an anonymous researcher and scarlet for\ntheir assistance. \n\nmacOS Ventura 13.1 may be obtained from the Mac App Store or Apple\u0027s\nSoftware Downloads web site: https://support.apple.com/downloads/\nAll information is also posted on the Apple Security Updates\nweb site: https://support.apple.com/en-us/HT201222. \n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n\niQIzBAEBCAAdFiEEBP+4DupqR5Sgt1DB4RjMIDkeNxkFAmOZFYAACgkQ4RjMIDke\nNxk1zRAAuqDsK19ODzl+oIO6xYMDcbiQV/ibvU9uwLtwTR8Y2wLga9V/vaaPTS6z\nqRkTivKEfdLMVW8Xlzl1jb+BMS0+dIjYrPAFatU8A5H2A3MLY5Trl9tTs+D8BgQJ\nreLRAyR6qJVwu+VMMjgrUxkQliPNYeumrmLwmKJdByYPzv4GLY5bOIf6siUAIJdB\nvs2zzcq6+BnoJkS1iYa+Ub5S3bSryR2i8vrSit6PcYBtLKHxUJaK2YBdA8LoqB4J\nwenkEaEhyilm0bpyyF0VxDuvOcotqrGa2ikScrik/N/NueMqDi9duo9kKKVia0xa\nGx2cYLNDG10KBmz9w9B8YC6lNa6t7M5zmCYn8TmXTfndd7fCYbYajZNT0WxIYteK\nsXYPkVpqEd4KVZxtQ3MfHlx5y4FwnqBkLACnfsNCs4KatbJPEg9Qy9Mn2ymi/9He\nUoVt3XnQVhAgGIRV2qezjV9r0rtgnWpSKvFd9LSDcB9F6b/bzRipbxVnqdWCL1If\nymeeEY8BJ7WJnFqgXzRo42+4bp4R67iNH+Z/JjUy/Z7C3f2O66fFZu2pNL1vLILA\nWi/dprF13SjqCIavwWPbVL8UvfaAwBz53y38gwei6eSdsEO383r0XIIKjErGbWm6\nhqHq/QKTWHQZqUFj4kUb4Ajw8Qe0j0qSrCLt4Wl11u/0r5hTRyI=\n=C5EK\n-----END PGP SIGNATURE-----\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2022-42841" }, { "db": "JVNDB", "id": "JVNDB-2022-023515" }, { "db": "VULHUB", "id": "VHN-439633" }, { "db": "VULMON", "id": "CVE-2022-42841" }, { "db": "PACKETSTORM", "id": "170316" }, { "db": "PACKETSTORM", "id": "170315" }, { "db": "PACKETSTORM", "id": "170314" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-439633", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-439633" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-42841", "trust": 3.7 }, { "db": "PACKETSTORM", "id": "170316", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-023515", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-3151", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "170315", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "170314", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-439633", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-42841", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-439633" }, { "db": "VULMON", "id": "CVE-2022-42841" }, { "db": "JVNDB", "id": "JVNDB-2022-023515" }, { "db": "PACKETSTORM", "id": "170316" }, { "db": "PACKETSTORM", "id": "170315" }, { "db": "PACKETSTORM", "id": "170314" }, { "db": "NVD", "id": "CVE-2022-42841" }, { "db": "CNNVD", "id": "CNNVD-202212-3151" } ] }, "id": "VAR-202212-1268", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-439633" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:09:34.654000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT213533 Apple\u00a0 Security update", "trust": 0.8, "url": "https://support.apple.com/en-us/ht213532" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023515" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-439633" }, { "db": "JVNDB", "id": "JVNDB-2022-023515" }, { "db": "NVD", "id": "CVE-2022-42841" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://seclists.org/fulldisclosure/2022/dec/23" }, { "trust": 2.5, "url": "http://seclists.org/fulldisclosure/2022/dec/24" }, { "trust": 2.5, "url": "http://seclists.org/fulldisclosure/2022/dec/25" }, { "trust": 2.4, "url": "https://support.apple.com/en-us/ht213534" }, { "trust": 1.8, "url": "https://support.apple.com/en-us/ht213532" }, { "trust": 1.8, "url": "https://support.apple.com/en-us/ht213533" }, { "trust": 1.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42841" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-42841/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/apple-ios-macos-multiple-vulnerabilities-of-december-2022-40105" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/170316/apple-security-advisory-2022-12-13-6.html" }, { "trust": 0.3, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42840" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42842" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42845" }, { "trust": 0.3, "url": "https://support.apple.com/en-us/ht201222." }, { "trust": 0.3, "url": "https://support.apple.com/downloads/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32942" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-40303" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42864" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-40304" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46689" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42821" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42854" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://support.apple.com/ht213534." }, { "trust": 0.1, "url": "https://support.apple.com/ht213533." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42861" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32943" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29181" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42847" }, { "trust": 0.1, "url": "https://support.apple.com/ht213532." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24836" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42853" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42843" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42852" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42837" } ], "sources": [ { "db": "VULHUB", "id": "VHN-439633" }, { "db": "VULMON", "id": "CVE-2022-42841" }, { "db": "JVNDB", "id": "JVNDB-2022-023515" }, { "db": "PACKETSTORM", "id": "170316" }, { "db": "PACKETSTORM", "id": "170315" }, { "db": "PACKETSTORM", "id": "170314" }, { "db": "NVD", "id": "CVE-2022-42841" }, { "db": "CNNVD", "id": "CNNVD-202212-3151" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-439633" }, { "db": "VULMON", "id": "CVE-2022-42841" }, { "db": "JVNDB", "id": "JVNDB-2022-023515" }, { "db": "PACKETSTORM", "id": "170316" }, { "db": "PACKETSTORM", "id": "170315" }, { "db": "PACKETSTORM", "id": "170314" }, { "db": "NVD", "id": "CVE-2022-42841" }, { "db": "CNNVD", "id": "CNNVD-202212-3151" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-15T00:00:00", "db": "VULHUB", "id": "VHN-439633" }, { "date": "2022-12-15T00:00:00", "db": "VULMON", "id": "CVE-2022-42841" }, { "date": "2023-11-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023515" }, { "date": "2022-12-22T02:12:32", "db": "PACKETSTORM", "id": "170316" }, { "date": "2022-12-22T02:12:10", "db": "PACKETSTORM", "id": "170315" }, { "date": "2022-12-22T02:11:48", "db": "PACKETSTORM", "id": "170314" }, { "date": "2022-12-15T19:15:23.730000", "db": "NVD", "id": "CVE-2022-42841" }, { "date": "2022-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-3151" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-09T00:00:00", "db": "VULHUB", "id": "VHN-439633" }, { "date": "2022-12-15T00:00:00", "db": "VULMON", "id": "CVE-2022-42841" }, { "date": "2023-11-29T03:02:00", "db": "JVNDB", "id": "JVNDB-2022-023515" }, { "date": "2023-01-09T17:00:32.883000", "db": "NVD", "id": "CVE-2022-42841" }, { "date": "2022-12-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-3151" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3151" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "apple\u0027s \u00a0macOS\u00a0 Vulnerability regarding mix-ups in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023515" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3151" } ], "trust": 0.6 } }
ghsa-qhqr-ffv4-wv7f
Vulnerability from github
A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution.
{ "affected": [], "aliases": [ "CVE-2022-42841" ], "database_specific": { "cwe_ids": [ "CWE-843" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-12-15T19:15:00Z", "severity": "HIGH" }, "details": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution.", "id": "GHSA-qhqr-ffv4-wv7f", "modified": "2022-12-19T21:30:28Z", "published": "2022-12-15T21:30:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42841" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT213532" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT213533" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT213534" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2022/Dec/23" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2022/Dec/24" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2022/Dec/25" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
wid-sec-w-2022-2313
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um den Benutzer zu t\u00e4uschen, Informationen offenzulegen, Sicherheitsmechanismen zu umgehen, Rechte zu erweitern und beliebigen Code mit Kernel-Rechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2313 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2313.json" }, { "category": "self", "summary": "WID-SEC-2022-2313 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2313" }, { "category": "external", "summary": "Apple Security Advisory HT213532 vom 2022-12-13", "url": "https://support.apple.com/de-de/HT213532" }, { "category": "external", "summary": "Apple Security Advisory HT213533 vom 2022-12-13", "url": "https://support.apple.com/de-de/HT213533" }, { "category": "external", "summary": "Apple Security Advisory HT213534 vom 2022-12-13", "url": "https://support.apple.com/de-de/HT213534" }, { "category": "external", "summary": "CISA Known Exploited Vulnerabilities Catalog vom 2024-01-31", "url": "https://www.cisa.gov/news-events/alerts/2024/01/31/cisa-adds-one-known-exploited-vulnerability-catalog" } ], "source_lang": "en-US", "title": "Apple macOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-31T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:06:32.770+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-2313", "initial_release_date": "2022-12-13T23:00:00.000+00:00", "revision_history": [ { "date": "2022-12-13T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-12-20T23:00:00.000+00:00", "number": "2", "summary": "Name \"Achilles\" f\u00fcr CVE-2022-42821 aufgenommen" }, { "date": "2023-04-10T22:00:00.000+00:00", "number": "3", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-04-13T22:00:00.000+00:00", "number": "4", "summary": "CVE Nummern erg\u00e4nzt" }, { "date": "2024-01-31T23:00:00.000+00:00", "number": "5", "summary": "CVE-2022-48618 erg\u00e4nzt, wird aktiv ausgenutzt" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Apple macOS Ventura \u003c 13.1", "product": { "name": "Apple macOS Ventura \u003c 13.1", "product_id": "T025600", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:13.1" } } }, { "category": "product_name", "name": "Apple macOS Monterey \u003c 12.6.2", "product": { "name": "Apple macOS Monterey \u003c 12.6.2", "product_id": "T025601", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:12.6.2" } } }, { "category": "product_name", "name": "Apple macOS Big Sur \u003c 11.7.2", "product": { "name": "Apple macOS Big Sur \u003c 11.7.2", "product_id": "T025603", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:11.7.2" } } } ], "category": "product_name", "name": "macOS" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-48618", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-48618" }, { "cve": "CVE-2022-46720", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46720" }, { "cve": "CVE-2022-46716", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46716" }, { "cve": "CVE-2022-46705", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46705" }, { "cve": "CVE-2022-46704", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46704" }, { "cve": "CVE-2022-46703", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46703" }, { "cve": "CVE-2022-46701", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46701" }, { "cve": "CVE-2022-46700", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46700" }, { "cve": "CVE-2022-46699", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46699" }, { "cve": "CVE-2022-46698", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46698" }, { "cve": "CVE-2022-46697", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46697" }, { "cve": "CVE-2022-46696", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46696" }, { "cve": "CVE-2022-46695", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46695" }, { "cve": "CVE-2022-46693", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46693" }, { "cve": "CVE-2022-46692", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46692" }, { "cve": "CVE-2022-46691", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46691" }, { "cve": "CVE-2022-46690", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46690" }, { "cve": "CVE-2022-46689", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-46689" }, { "cve": "CVE-2022-42867", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42867" }, { "cve": "CVE-2022-42866", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42866" }, { "cve": "CVE-2022-42865", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42865" }, { "cve": "CVE-2022-42864", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42864" }, { "cve": "CVE-2022-42863", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42863" }, { "cve": "CVE-2022-42862", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42862" }, { "cve": "CVE-2022-42861", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42861" }, { "cve": "CVE-2022-42859", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42859" }, { "cve": "CVE-2022-42858", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42858" }, { "cve": "CVE-2022-42856", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42856" }, { "cve": "CVE-2022-42855", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42855" }, { "cve": "CVE-2022-42854", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42854" }, { "cve": "CVE-2022-42853", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42853" }, { "cve": "CVE-2022-42852", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42852" }, { "cve": "CVE-2022-42847", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42847" }, { "cve": "CVE-2022-42845", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42845" }, { "cve": "CVE-2022-42843", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42843" }, { "cve": "CVE-2022-42842", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42842" }, { "cve": "CVE-2022-42841", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42841" }, { "cve": "CVE-2022-42840", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42840" }, { "cve": "CVE-2022-42837", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42837" }, { "cve": "CVE-2022-42821", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-42821" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-32943", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-32943" }, { "cve": "CVE-2022-32942", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-32942" }, { "cve": "CVE-2022-29181", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-29181" }, { "cve": "CVE-2022-24836", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen aufgrund verschiedener Fehler in der Speicherverwaltung, sowie aufgrund fehlender oder mangelhafter Pr\u00fcfungen. Betroffen sind zahlreiche Komponenten, beispielsweise WebKit und der Kernel von macOS. Ein Angreifer kann dadurch den Nutzer t\u00e4uschen, Informationen offenlegen, Sicherheitsmechanismen umgehen, seine Privilegien eskalieren und beliebigen Code mit Kernel-Rechten ausf\u00fchren." } ], "release_date": "2022-12-13T23:00:00Z", "title": "CVE-2022-24836" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.