CVE-2023-23514

A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, macOS Big Sur 11.7.5. An app may be able to execute arbitrary code with kernel privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

27 Jul 2023, 04:15

Type Values Removed Values Added
Summary A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.2.1, iOS 16.3.1 and iPadOS 16.3.1. An app may be able to execute arbitrary code with kernel privileges.. A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, macOS Big Sur 11.7.5. An app may be able to execute arbitrary code with kernel privileges.
References
  • {'url': 'http://seclists.org/fulldisclosure/2023/Mar/18', 'name': '20230327 APPLE-SA-2023-03-27-4 macOS Monterey 12.6.4', 'tags': [], 'refsource': 'FULLDISC'}
  • {'url': 'https://support.apple.com/kb/HT213675', 'name': 'https://support.apple.com/kb/HT213675', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html', 'name': 'http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Mar/17', 'name': '20230327 APPLE-SA-2023-03-27-3 macOS Ventura 13.3', 'tags': [], 'refsource': 'FULLDISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Mar/21', 'name': '20230327 APPLE-SA-2023-03-27-5 macOS Big Sur 11.7.5', 'tags': [], 'refsource': 'FULLDISC'}
  • {'url': 'https://support.apple.com/kb/HT213670', 'name': 'https://support.apple.com/kb/HT213670', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'https://support.apple.com/kb/HT213677', 'name': 'https://support.apple.com/kb/HT213677', 'tags': [], 'refsource': 'CONFIRM'}
  • (MISC) https://support.apple.com/en-us/HT213675 -
  • (MISC) https://support.apple.com/en-us/HT213677 -
  • (MISC) https://support.apple.com/en-us/HT213670 -

28 Mar 2023, 05:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Mar/17 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Mar/21 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Mar/18 -

28 Mar 2023, 02:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT213670 -
  • (CONFIRM) https://support.apple.com/kb/HT213677 -
  • (CONFIRM) https://support.apple.com/kb/HT213675 -

16 Mar 2023, 17:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html -

08 Mar 2023, 16:31

Type Values Removed Values Added
First Time Apple iphone Os
Apple ipados
Apple macos
Apple
References (MISC) https://support.apple.com/en-us/HT213633 - (MISC) https://support.apple.com/en-us/HT213633 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213635 - (MISC) https://support.apple.com/en-us/HT213635 - Vendor Advisory
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

27 Feb 2023, 20:25

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-27 20:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-23514

Mitre link : CVE-2023-23514

CVE.ORG link : CVE-2023-23514


JSON object : View

Products Affected

apple

  • macos
  • iphone_os
  • ipados
CWE
CWE-416

Use After Free