First published: Mon Mar 27 2023(Updated: )
AMD. A buffer overflow issue was addressed with improved memory handling.
Credit: product-security@apple.com Meysam Firouzi @R00tkitSMM Mbition Mercedesjzhu Trend Micro Zero Day InitiativeMickey Jin @patch1t Yiğit Can YILMAZ @yilmazcanyigit Murray Mike Pan ZhenPeng @Peterpan0927 STAR Labs SG PteArsenii Kostromin (0x3c3e) Félix Poulin-Bélanger David Pan Ogea Xinru Chi Pangu LabNed Williamson Google Project ZeroAdam Doupé ASU SEFCOMsqrtpwn an anonymous researcher Red CanaryBrandon Dalton @partyD0lphin Red CanaryMilan Tenk F FArthur Valiev FZweig Kunlun LabJoshua Jones Zhuowei Zhang developStorm Khiem Tran Csaba Fitzl @theevilbit Offensive SecurityMickey Jin @patch1t FFRI Security IncKoh M. Nakagawa FFRI Security Inc Offensive SecurityMasahiro Kawada @kawakatz GMO Cybersecurity by IeraeJubaer Alnazi Jabin TRS Group Of Companies Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba GroupAdam M. Guilherme Rambo Best Buddy AppsXin Huang @11iaxH CVE-2023-0049 CVE-2023-0051 CVE-2023-0054 CVE-2023-0288 CVE-2023-0433 CVE-2023-0512 Gertjan Franken imecKU Leuven hazbinhotel Trend Micro Zero Day InitiativeGeorgy Kucherin @kucher1n KasperskyLeonid Bezvershenko @bzvr_ KasperskyBoris Larin @oct0xor Kaspersky KasperskyValentin Pashkov Kasperskyan anonymous researcher Anonymous Trend Micro Zero Day InitiativeDohyun Lee @l33d0hyun SSD Labscrixer @pwning_me SSD LabsJubaer Alnazi TRS Group of Companiesryuzaki Aleksandar Nikolic Cisco TalosMikko Kenttälä ) @Turmio_ SensorFuYe Zhang @VAR10CK Baidu SecurityChan Shue Long Offensive SecurityRıza Sabuncu @rizasabuncu JeongOhKyea Tingting Yin Tsinghua UniversityJunoh Lee at Theori CVE-2022-43551 CVE-2022-43552 ABC Research s.r.o. Mohamed Ghannam @_simo36
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | >=13.0<13.3 | |
macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-32362 is a vulnerability in macOS Ventura where error handling was changed to not reveal sensitive information.
CVE-2023-32362 allows a website to track sensitive user information on macOS Ventura.
CVE-2023-32362 has a severity rating of 6.5, considered medium.
To fix CVE-2023-32362, update macOS Ventura to version 13.3 or above.
You can find more information about CVE-2023-32362 on the Apple support page: https://support.apple.com/en-us/HT213670