mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
142 lines
5.4 KiB
JSON
142 lines
5.4 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2022-46693",
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Apple",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "iCloud for Windows",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "14.1"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "tvOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "16.2"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "tvOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "13.1"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "tvOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "16.2"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "watchOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "9.2"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Processing a maliciously crafted file may lead to arbitrary code execution"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT213535",
|
|
"name": "https://support.apple.com/en-us/HT213535"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT213532",
|
|
"name": "https://support.apple.com/en-us/HT213532"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT213538",
|
|
"name": "https://support.apple.com/en-us/HT213538"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT213530",
|
|
"name": "https://support.apple.com/en-us/HT213530"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT213536",
|
|
"name": "https://support.apple.com/en-us/HT213536"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20221220 APPLE-SA-2022-12-13-1 iOS 16.2 and iPadOS 16.2",
|
|
"url": "http://seclists.org/fulldisclosure/2022/Dec/20"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1",
|
|
"url": "http://seclists.org/fulldisclosure/2022/Dec/23"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20221220 APPLE-SA-2022-12-13-7 tvOS 16.2",
|
|
"url": "http://seclists.org/fulldisclosure/2022/Dec/26"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in tvOS 16.2, iCloud for Windows 14.1, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing a maliciously crafted file may lead to arbitrary code execution."
|
|
}
|
|
]
|
|
}
|
|
} |