CVE-2023-28205

A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

27 Jul 2023, 04:15

Type Values Removed Values Added
Summary A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.7.5 and iPadOS 15.7.5, macOS Ventura 13.3.1, Safari 16.4.1, iOS 16.4.1 and iPadOS 16.4.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

26 Jul 2023, 23:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00011.html', 'name': '[debian-lts-announce] 20230512 [SECURITY] [DLA 3419-1] webkit2gtk security update', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://security.gentoo.org/glsa/202305-32', 'name': 'GLSA-202305-32', 'tags': [], 'refsource': 'GENTOO'}
Summary A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3.1, iOS 16.4.1 and iPadOS 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, Safari 16.4.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.7.5 and iPadOS 15.7.5, macOS Ventura 13.3.1, Safari 16.4.1, iOS 16.4.1 and iPadOS 16.4.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

30 May 2023, 06:16

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202305-32 -

12 May 2023, 12:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/05/msg00011.html -

08 May 2023, 20:15

Type Values Removed Values Added
Summary A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.7.5 and iPadOS 15.7.5, Safari 16.4.1, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3.1, iOS 16.4.1 and iPadOS 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, Safari 16.4.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/', 'name': 'FEDORA-2023-a4bbf02a57', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Apr/1', 'name': '20230410 APPLE-SA-2023-04-07-1 iOS 16.4.1 and iPadOS 16.4.1', 'tags': ['Mailing List', 'Release Notes'], 'refsource': 'FULLDISC'}
  • {'url': 'https://www.debian.org/security/2023/dsa-5397', 'name': 'DSA-5397', 'tags': [], 'refsource': 'DEBIAN'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Apr/5', 'name': '20230410 APPLE-SA-2023-04-10-1 iOS 15.7.5 and iPadOS 15.7.5', 'tags': ['Mailing List', 'Release Notes'], 'refsource': 'FULLDISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Apr/3', 'name': '20230410 APPLE-SA-2023-04-07-3 Safari 16.4.1', 'tags': ['Mailing List', 'Release Notes'], 'refsource': 'FULLDISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Apr/2', 'name': '20230410 APPLE-SA-2023-04-07-2 macOS Ventura 13.3.1', 'tags': ['Mailing List', 'Release Notes'], 'refsource': 'FULLDISC'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2023/04/21/3', 'name': '[oss-security] 20230421 WebKitGTK and WPE WebKit Security Advisory WSA-2023-0003', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/', 'name': 'FEDORA-2023-5b61346bbe', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://www.debian.org/security/2023/dsa-5396', 'name': 'DSA-5396', 'tags': [], 'refsource': 'DEBIAN'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/', 'name': 'FEDORA-2023-8900b35c6f', 'tags': [], 'refsource': 'FEDORA'}

05 May 2023, 17:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/ -

03 May 2023, 21:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5397 -
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5396 -

01 May 2023, 06:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/ -

22 Apr 2023, 03:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/ -

21 Apr 2023, 18:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2023/04/21/3 -

11 Apr 2023, 14:36

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
CWE CWE-416
First Time Apple macos
Apple iphone Os
Apple ipados
Apple safari
Apple
References (MISC) https://support.apple.com/en-us/HT213722 - (MISC) https://support.apple.com/en-us/HT213722 - Release Notes
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/5 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/5 - Mailing List, Release Notes
References (MISC) https://support.apple.com/en-us/HT213723 - (MISC) https://support.apple.com/en-us/HT213723 - Release Notes
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/1 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/1 - Mailing List, Release Notes
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/3 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/3 - Mailing List, Release Notes
References (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/2 - (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/2 - Mailing List, Release Notes
References (MISC) https://support.apple.com/en-us/HT213721 - (MISC) https://support.apple.com/en-us/HT213721 - Release Notes
References (MISC) https://support.apple.com/en-us/HT213720 - (MISC) https://support.apple.com/en-us/HT213720 - Release Notes

11 Apr 2023, 05:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/5 -

11 Apr 2023, 04:16

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/3 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/2 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Apr/1 -

10 Apr 2023, 19:18

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-10 19:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-28205

Mitre link : CVE-2023-28205

CVE.ORG link : CVE-2023-28205


JSON object : View

Products Affected

apple

  • safari
  • iphone_os
  • ipados
  • macos
CWE
CWE-416

Use After Free