CVE-2023-42883

The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, iOS 17.2 and iPadOS 17.2, watchOS 10.2, tvOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. Processing an image may lead to a denial-of-service.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Dec/12 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Dec/13 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Dec/6 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Dec/7 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Dec/8 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Dec/9 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/12/18/1 Mailing List Third Party Advisory
https://support.apple.com/en-us/HT214034 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214035 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214036 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214039 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214040 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214041 Release Notes Vendor Advisory
https://www.debian.org/security/2023/dsa-5580 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

History

02 Feb 2024, 03:10

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
References () http://www.openwall.com/lists/oss-security/2023/12/18/1 - () http://www.openwall.com/lists/oss-security/2023/12/18/1 - Mailing List, Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5580 - () https://www.debian.org/security/2023/dsa-5580 - Mailing List, Third Party Advisory
First Time Debian
Debian debian Linux

19 Dec 2023, 21:15

Type Values Removed Values Added
References
  • () https://www.debian.org/security/2023/dsa-5580 -

18 Dec 2023, 04:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2023/12/18/1 -

13 Dec 2023, 18:29

Type Values Removed Values Added
CPE cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () http://seclists.org/fulldisclosure/2023/Dec/12 - () http://seclists.org/fulldisclosure/2023/Dec/12 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Dec/13 - () http://seclists.org/fulldisclosure/2023/Dec/13 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Dec/6 - () http://seclists.org/fulldisclosure/2023/Dec/6 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Dec/7 - () http://seclists.org/fulldisclosure/2023/Dec/7 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Dec/8 - () http://seclists.org/fulldisclosure/2023/Dec/8 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Dec/9 - () http://seclists.org/fulldisclosure/2023/Dec/9 - Mailing List, Third Party Advisory
References () https://support.apple.com/en-us/HT214034 - () https://support.apple.com/en-us/HT214034 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214035 - () https://support.apple.com/en-us/HT214035 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214036 - () https://support.apple.com/en-us/HT214036 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214039 - () https://support.apple.com/en-us/HT214039 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214040 - () https://support.apple.com/en-us/HT214040 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214041 - () https://support.apple.com/en-us/HT214041 - Release Notes, Vendor Advisory
CWE NVD-CWE-noinfo
First Time Apple safari
Apple ipados
Apple watchos
Apple macos
Apple
Apple iphone Os
Apple tvos

13 Dec 2023, 03:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2023/Dec/12 -
  • () http://seclists.org/fulldisclosure/2023/Dec/13 -

13 Dec 2023, 01:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2023/Dec/6 -
  • () http://seclists.org/fulldisclosure/2023/Dec/7 -
  • () http://seclists.org/fulldisclosure/2023/Dec/8 -
  • () http://seclists.org/fulldisclosure/2023/Dec/9 -

12 Dec 2023, 13:43

Type Values Removed Values Added
Summary
  • (es) El problema se solucionó mejorando el manejo de la memoria. Este problema se solucionó en Safari 17.2, macOS Sonoma 14.2, iOS 17.2 y iPadOS 17.2, watchOS 10.2, tvOS 17.2, iOS 16.7.3 y iPadOS 16.7.3. Procesar una imagen puede dar lugar a una denegación de servicio.

12 Dec 2023, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-12 01:15

Updated : 2024-02-02 03:10


NVD link : CVE-2023-42883

Mitre link : CVE-2023-42883

CVE.ORG link : CVE-2023-42883


JSON object : View

Products Affected

apple

  • iphone_os
  • tvos
  • safari
  • ipados
  • watchos
  • macos

debian

  • debian_linux