First published: Mon Mar 27 2023(Updated: )
AMD. A buffer overflow issue was addressed with improved memory handling.
Credit: Mickey Jin @patch1t Zweig Kunlun LabJoshua Jones Zhuowei Zhang Mickey Jin @patch1t FFRI Security IncKoh M. Nakagawa FFRI Security Inc Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityYiğit Can YILMAZ @yilmazcanyigit Jubaer Alnazi Jabin TRS Group Of CompaniesWenchao Li Alibaba GroupXiaolong Bai Alibaba GroupAdam M. Guilherme Rambo Best Buddy AppsCVE-2023-0433 CVE-2023-0512 sqrtpwn Arsenii Kostromin (0x3c3e) Pan ZhenPeng STAR Labs SG PteTingting Yin Tsinghua UniversityAleksandar Nikolic Cisco TalosYe Zhang @VAR10CK Baidu Securityan anonymous researcher Murray Mike Félix Poulin-Bélanger David Pan Ogea Xinru Chi Pangu LabNed Williamson Google Project ZeroMohamed GHANNAM @_simo36 Brandon Dalton @partyD0lphin Red CanaryRıza Sabuncu @rizasabuncu JeongOhKyea Xin Huang @11iaxH CVE-2023-0049 CVE-2023-0051 CVE-2023-0054 CVE-2023-0288 Gertjan Franken imecKU Leuven hazbinhotel Trend Micro Zero Day InitiativeGeorgy Kucherin @kucher1n KasperskyLeonid Bezvershenko @bzvr_ KasperskyBoris Larin @oct0xor Kaspersky KasperskyValentin Pashkov KasperskyAnonymous Trend Micro Zero Day InitiativeDohyun Lee @l33d0hyun SSD Labscrixer @pwning_me SSD LabsABC Research s.r.o. Mohamed Ghannam @_simo36 Chan Shue Long Offensive SecurityJunoh Lee at Theori CVE-2022-43551 CVE-2022-43552 Mikko Kenttälä ) @Turmio_ SensorFuJubaer Alnazi TRS Group of Companiesjzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition Mercedesryuzaki Pan ZhenPeng @Peterpan0927 STAR Labs SG PteAdam Doupé ASU SEFCOMan anonymous researcher Red CanaryMilan Tenk F FArthur Valiev FdevelopStorm Khiem Tran Masahiro Kawada @kawakatz GMO Cybersecurity by Ierae Alibaba Group product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.6.4 | 12.6.4 |
Apple macOS | <13.3 | 13.3 |
iPadOS | <15.7.4 | |
Apple iPhone OS | <15.7.4 | |
Apple macOS | >=12.0<12.6.4 | |
Apple macOS | >=13.0<13.3 | |
iPadOS | <15.7.4 | |
Apple iOS | <15.7.4 | 15.7.4 |
iPadOS | <15.7.4 | 15.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-27949 is a vulnerability in Model I/O that allows for an out-of-bounds read, which has been addressed with improved input validation.
The severity of CVE-2023-27949 is high, with a severity value of 7.8.
CVE-2023-27949 affects Apple iOS versions up to and excluding 15.7.4, leading to unexpected app termination or arbitrary code execution when processing a maliciously crafted file.
CVE-2023-27949 affects Apple macOS versions between 12.0 and 12.6.4, as well as versions between 13.0 and 13.3, leading to unexpected app termination or arbitrary code execution when processing a maliciously crafted file.
CVE-2023-27949 is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 15.7.4, and iPadOS 15.7.4. Update to the respective versions to address the vulnerability.