ID

VAR-202301-1721


CVE

CVE-2023-23502


TITLE

Vulnerabilities in multiple Apple products

Trust: 0.8

sources: JVNDB: JVNDB-2023-004749

DESCRIPTION

An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3, tvOS 16.3, watchOS 9.3. An app may be able to determine kernel memory layout. iPadOS , iOS , macOS Unspecified vulnerabilities exist in multiple Apple products.Information may be obtained. Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "iOS 16.3 and iPadOS 16.3". Information about the security content is also available at https://support.apple.com/HT213605. AppleMobileFileIntegrity Available for: macOS Ventura Impact: An app may be able to access user-sensitive data Description: This issue was addressed by enabling hardened runtime. CVE-2023-23499: Wojciech Reguła (@_r3ggi) of SecuRing (wojciechregula.blog) curl Available for: macOS Ventura Impact: Multiple issues in curl Description: Multiple issues were addressed by updating to curl version 7.86.0. CVE-2022-42915 CVE-2022-42916 CVE-2022-32221 CVE-2022-35260 dcerpc Available for: macOS Ventura Impact: Mounting a maliciously crafted Samba network share may lead to arbitrary code execution Description: A buffer overflow issue was addressed with improved memory handling. CVE-2023-23513: Dimitrios Tatsis and Aleksandar Nikolic of Cisco Talos DiskArbitration Available for: macOS Ventura Impact: An encrypted volume may be unmounted and remounted by a different user without prompting for the password Description: A logic issue was addressed with improved state management. CVE-2023-23493: Oliver Norpoth (@norpoth) of KLIXX GmbH (klixx.com) ImageIO Available for: macOS Ventura Impact: Processing an image may lead to a denial-of-service Description: A memory corruption issue was addressed with improved state management. CVE-2023-23519: Yiğit Can YILMAZ (@yilmazcanyigit) Intel Graphics Driver Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved bounds checks. CVE-2023-23507: an anonymous researcher Kernel Available for: macOS Ventura Impact: An app may be able to leak sensitive kernel state Description: The issue was addressed with improved memory handling. CVE-2023-23500: Pan ZhenPeng (@Peterpan0927) of STAR Labs SG Pte. Ltd. CVE-2023-23502: Pan ZhenPeng (@Peterpan0927) of STAR Labs SG Pte. Ltd. (@starlabs_sg) Kernel Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2023-23504: Adam Doupé of ASU SEFCOM libxpc Available for: macOS Ventura Impact: An app may be able to access user-sensitive data Description: A permissions issue was addressed with improved validation. CVE-2023-23506: Guilherme Rambo of Best Buddy Apps (rambo.codes) Mail Drafts Available for: macOS Ventura Impact: The quoted original message may be selected from the wrong email when forwarding an email from an Exchange account Description: A logic issue was addressed with improved state management. CVE-2023-23498: an anonymous researcher Maps Available for: macOS Ventura Impact: An app may be able to bypass Privacy preferences Description: A logic issue was addressed with improved state management. CVE-2023-23503: an anonymous researcher PackageKit Available for: macOS Ventura Impact: An app may be able to gain root privileges Description: A logic issue was addressed with improved state management. CVE-2023-23497: Mickey Jin (@patch1t) Safari Available for: macOS Ventura Impact: An app may be able to access a user’s Safari history Description: A permissions issue was addressed with improved validation. CVE-2023-23510: Guilherme Rambo of Best Buddy Apps (rambo.codes) Safari Available for: macOS Ventura Impact: Visiting a website may lead to an app denial-of-service Description: The issue was addressed with improved handling of caches. CVE-2023-23512: Adriatik Raci Screen Time Available for: macOS Ventura Impact: An app may be able to access information about a user’s contacts Description: A privacy issue was addressed with improved private data redaction for log entries. CVE-2023-23505: Wojciech Reguła of SecuRing (wojciechregula.blog) Vim Available for: macOS Ventura Impact: Multiple issues in Vim Description: A use after free issue was addressed with improved memory management. CVE-2022-3705 Weather Available for: macOS Ventura Impact: An app may be able to bypass Privacy preferences Description: The issue was addressed with improved memory handling. CVE-2023-23511: Wojciech Regula of SecuRing (wojciechregula.blog), an anonymous researcher WebKit Available for: macOS Ventura Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: The issue was addressed with improved checks. WebKit Bugzilla: 245464 CVE-2023-23496: ChengGang Wu, Yan Kang, YuHao Hu, Yue Sun, Jiming Wang, JiKai Ren and Hang Shu of Institute of Computing Technology, Chinese Academy of Sciences WebKit Available for: macOS Ventura Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: The issue was addressed with improved memory handling. WebKit Bugzilla: 248268 CVE-2023-23518: YeongHyeon Choi (@hyeon101010), Hyeon Park (@tree_segment), SeOk JEON (@_seokjeon), YoungSung Ahn (@_ZeroSung), JunSeo Bae (@snakebjs0107), Dohyun Lee (@l33d0hyun) of Team ApplePIE WebKit Bugzilla: 248268 CVE-2023-23517: YeongHyeon Choi (@hyeon101010), Hyeon Park (@tree_segment), SeOk JEON (@_seokjeon), YoungSung Ahn (@_ZeroSung), JunSeo Bae (@snakebjs0107), Dohyun Lee (@l33d0hyun) of Team ApplePIE Wi-Fi Available for: macOS Ventura Impact: An app may be able to disclose kernel memory Description: The issue was addressed with improved memory handling. CVE-2023-23501: Pan ZhenPeng (@Peterpan0927) of STAR Labs SG Pte. Ltd. (@starlabs_sg) Windows Installer Available for: macOS Ventura Impact: An app may be able to bypass Privacy preferences Description: The issue was addressed with improved memory handling. CVE-2023-23508: Mickey Jin (@patch1t) Additional recognition Bluetooth We would like to acknowledge an anonymous researcher for their assistance. Kernel We would like to acknowledge Nick Stenning of Replicate for their assistance. Shortcuts We would like to acknowledge Baibhav Anand Jha from ReconWithMe and Cristian Dinca of Tudor Vianu National High School of Computer Science, Romania for their assistance. WebKit We would like to acknowledge Eliya Stein of Confiant for their assistance. macOS Ventura 13.2 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEBP+4DupqR5Sgt1DB4RjMIDkeNxkFAmPPIl8ACgkQ4RjMIDke Nxnt7RAA2a0c/Ij93MfR8eiNMkIHVnr+wL+4rckVmHvs85dSHNBqQ8+kYpAs2tEk 7CVZoxAGg8LqVa6ZmBbAp5ZJGi2nV8LjOYzaWw/66d648QC2upTWJ93sWmZ7LlLb m9pcLfBsdAFPmVa8VJO0fxJGkxsCP0cQiBl+f9R4ObZBBiScbHUckSmHa6Qn/Q2U VsnHnJznAlDHMXiaV3O1zKBeahkqSx/IfO04qmk8oMWh89hI53S551Z3NEx63zgd Cx8JENj2NpFlgmZ0w0Tz5ZZ3LT4Ok28ns8N762JLE2nbTfEl7rM+bjUfWg4yJ1Rp TCEelbLKfUjlrh2N1fe0XWBs9br/069QlhTBBVd/qAbUBxkS/UOlWk3Vp+TI0bkK rrXouRijzRmBBK93jfWxhyd27avqQHmc04ofjY/lNYOCcGMrr813cGKNs90aRfcg joKeC51mYJnlTyMB0nDcJx3b5+MN+Ij7Sa04B9dbH162YFxp4LsaavmR0MooN1T9 3XrXEQ71a3pvdoF1ffW9Mz7vaqhBkffnzQwWU5zY2RwDTjFyHdNyI/1JkVzYmAxq QR4uA5gCDYYk/3rzlrVot+ezHX525clTHsvEYhIfu+i1HCxqdpvfaHbn2m+i1QtU /Lzz2mySt3y0akZ2rHwPfBZ8UFfvaauyhZ3EhSP3ikGs9DOsv1w= =pcJ4 -----END PGP SIGNATURE-----

Trust: 2.25

sources: NVD: CVE-2023-23502 // JVNDB: JVNDB-2023-004749 // VULHUB: VHN-451813 // VULMON: CVE-2023-23502 // PACKETSTORM: 170697 // PACKETSTORM: 170699 // PACKETSTORM: 170693 // PACKETSTORM: 170696 // PACKETSTORM: 170764

AFFECTED PRODUCTS

vendor:applemodel:macosscope:gteversion:12.0.0

Trust: 1.0

vendor:applemodel:macosscope:gteversion:13.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:13.2

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:9.3

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:16.3

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:16.3

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.6.3

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:16.3

Trust: 1.0

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

vendor:アップルmodel:tvosscope: - version: -

Trust: 0.8

vendor:アップルmodel:macosscope: - version: -

Trust: 0.8

vendor:アップルmodel:watchosscope:eqversion:9.3

Trust: 0.8

vendor:アップルmodel:ipadosscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-004749 // NVD: CVE-2023-23502

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-23502
value: MEDIUM

Trust: 1.0

NVD: CVE-2023-23502
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202301-1788
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2023-23502
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2023-23502
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-004749 // CNNVD: CNNVD-202301-1788 // NVD: CVE-2023-23502

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-004749 // NVD: CVE-2023-23502

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202301-1788

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202301-1788

PATCH

title:HT213605 Apple  Security updateurl:https://support.apple.com/en-us/HT213599

Trust: 0.8

title:Apple tvOS Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=222763

Trust: 0.6

sources: JVNDB: JVNDB-2023-004749 // CNNVD: CNNVD-202301-1788

EXTERNAL IDS

db:NVDid:CVE-2023-23502

Trust: 3.9

db:PACKETSTORMid:170764

Trust: 0.8

db:JVNDBid:JVNDB-2023-004749

Trust: 0.8

db:CNNVDid:CNNVD-202301-1788

Trust: 0.6

db:PACKETSTORMid:170693

Trust: 0.2

db:VULHUBid:VHN-451813

Trust: 0.1

db:VULMONid:CVE-2023-23502

Trust: 0.1

db:PACKETSTORMid:170697

Trust: 0.1

db:PACKETSTORMid:170699

Trust: 0.1

db:PACKETSTORMid:170696

Trust: 0.1

sources: VULHUB: VHN-451813 // VULMON: CVE-2023-23502 // JVNDB: JVNDB-2023-004749 // PACKETSTORM: 170697 // PACKETSTORM: 170699 // PACKETSTORM: 170693 // PACKETSTORM: 170696 // PACKETSTORM: 170764 // CNNVD: CNNVD-202301-1788 // NVD: CVE-2023-23502

REFERENCES

url:https://support.apple.com/en-us/ht213601

Trust: 2.4

url:https://support.apple.com/en-us/ht213599

Trust: 1.8

url:https://support.apple.com/en-us/ht213604

Trust: 1.8

url:https://support.apple.com/en-us/ht213605

Trust: 1.8

url:https://support.apple.com/en-us/ht213606

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-23502

Trust: 1.3

url:https://cxsecurity.com/cveshow/cve-2023-23502/

Trust: 0.6

url:https://packetstormsecurity.com/files/170764/apple-security-advisory-2023-01-24-1.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2023-23499

Trust: 0.5

url:https://www.apple.com/support/security/pgp/

Trust: 0.5

url:https://support.apple.com/en-us/ht201222.

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2023-23504

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2023-23503

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2023-23496

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2023-23500

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2023-23505

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2023-23518

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2023-23512

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2023-23511

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2023-23519

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2023-23517

Trust: 0.3

url:https://support.apple.com/downloads/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42915

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-32221

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42916

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-23493

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-23497

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-35260

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-23498

Trust: 0.2

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23507

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35252

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32915

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23508

Trust: 0.1

url:https://support.apple.com/ht213604.

Trust: 0.1

url:https://support.apple.com/ht213599.

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://support.apple.com/ht213606.

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://support.apple.com/ht213605.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3705

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23501

Trust: 0.1

url:https://support.apple.com/ht213601.

Trust: 0.1

sources: VULHUB: VHN-451813 // VULMON: CVE-2023-23502 // JVNDB: JVNDB-2023-004749 // PACKETSTORM: 170697 // PACKETSTORM: 170699 // PACKETSTORM: 170693 // PACKETSTORM: 170696 // PACKETSTORM: 170764 // CNNVD: CNNVD-202301-1788 // NVD: CVE-2023-23502

CREDITS

Apple

Trust: 0.5

sources: PACKETSTORM: 170697 // PACKETSTORM: 170699 // PACKETSTORM: 170693 // PACKETSTORM: 170696 // PACKETSTORM: 170764

SOURCES

db:VULHUBid:VHN-451813
db:VULMONid:CVE-2023-23502
db:JVNDBid:JVNDB-2023-004749
db:PACKETSTORMid:170697
db:PACKETSTORMid:170699
db:PACKETSTORMid:170693
db:PACKETSTORMid:170696
db:PACKETSTORMid:170764
db:CNNVDid:CNNVD-202301-1788
db:NVDid:CVE-2023-23502

LAST UPDATE DATE

2024-08-14T12:19:50.377000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-451813date:2023-03-08T00:00:00
db:VULMONid:CVE-2023-23502date:2023-02-27T00:00:00
db:JVNDBid:JVNDB-2023-004749date:2023-11-01T06:39:00
db:CNNVDid:CNNVD-202301-1788date:2023-03-09T00:00:00
db:NVDid:CVE-2023-23502date:2023-07-27T04:15:13.187

SOURCES RELEASE DATE

db:VULHUBid:VHN-451813date:2023-02-27T00:00:00
db:VULMONid:CVE-2023-23502date:2023-02-27T00:00:00
db:JVNDBid:JVNDB-2023-004749date:2023-11-01T00:00:00
db:PACKETSTORMid:170697date:2023-01-24T16:41:07
db:PACKETSTORMid:170699date:2023-01-24T16:41:48
db:PACKETSTORMid:170693date:2023-01-24T16:39:35
db:PACKETSTORMid:170696date:2023-01-24T16:40:49
db:PACKETSTORMid:170764date:2023-01-27T15:06:30
db:CNNVDid:CNNVD-202301-1788date:2023-01-24T00:00:00
db:NVDid:CVE-2023-23502date:2023-02-27T20:15:13.553