mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
131 lines
5.2 KiB
JSON
131 lines
5.2 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2022-32917",
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Apple",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "iOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "16"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "macOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "11.7"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "macOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "15.7"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "macOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "12.6"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited."
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT213446",
|
|
"name": "https://support.apple.com/en-us/HT213446"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT213443",
|
|
"name": "https://support.apple.com/en-us/HT213443"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT213445",
|
|
"name": "https://support.apple.com/en-us/HT213445"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://support.apple.com/en-us/HT213444",
|
|
"name": "https://support.apple.com/en-us/HT213444"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16",
|
|
"url": "http://seclists.org/fulldisclosure/2022/Oct/39"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20221030 APPLE-SA-2022-10-27-4 Additional information for APPLE-SA-2022-09-12-2 iOS 15.7 and iPadOS 15.7",
|
|
"url": "http://seclists.org/fulldisclosure/2022/Oct/40"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6",
|
|
"url": "http://seclists.org/fulldisclosure/2022/Oct/43"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7",
|
|
"url": "http://seclists.org/fulldisclosure/2022/Oct/45"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.."
|
|
}
|
|
]
|
|
}
|
|
} |