First published: Mon Mar 27 2023(Updated: )
dcerpc. The issue was addressed with improved bounds checks.
Credit: Aleksandar Nikolic Cisco TalosAleksandar Nikolic Cisco TalosAleksandar Nikolic Cisco Talos product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.7.5 | |
Apple macOS | >=12.0<12.6.4 | |
Apple macOS | >=13.0<13.3 | |
<12.6.4 | 12.6.4 | |
<11.7.5 | 11.7.5 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2023-27935 is high with a severity value of 8.8.
macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5, and iPadOS versions up to 13.3 are affected by CVE-2023-27935.
CVE-2023-27935 may result in unexpected app termination or arbitrary code execution by a remote user.
CVE-2023-27935 was fixed with improved bounds checks in macOS Ventura 13.3, macOS Monterey 12.6.4, and macOS Big Sur 11.7.5.
You can find more information about CVE-2023-27935 on the official Apple support page: [https://support.apple.com/en-us/HT213675](https://support.apple.com/en-us/HT213675)