Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-32373
HistoryJun 23, 2023 - 12:00 a.m.

CVE-2023-32373

2023-06-2300:00:00
ubuntu.com
ubuntu.com
48
use-after-free issue
watchos 9.5
tvos 16.5
macos ventura 13.4
ios 15.7.6
ipados 15.7.6
safari 16.5
arbitrary code execution
malicious web content
actively exploited
webkit
javascriptcore

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

47.3%

A use-after-free issue was addressed with improved memory management. This
issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6
and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing
maliciously crafted web content may lead to arbitrary code execution. Apple
is aware of a report that this issue may have been actively exploited.

Bugs

Notes

Author Note
jdstrand webkit receives limited support. For details, see https://wiki.ubuntu.com/SecurityTeam/FAQ#webkit webkit in Ubuntu uses the JavaScriptCore (JSC) engine, not V8

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

47.3%