cve/2023/CVE-2023-32423.md

24 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-32423](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32423)
![](https://img.shields.io/static/v1?label=Product&message=Safari&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2013.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2016.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%209.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Processing%20web%20content%20may%20disclose%20sensitive%20information&color=brighgreen)
### Description
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ulexec/Exploits