First published: Mon Mar 27 2023(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: Ye Zhang @VAR10CK Baidu SecurityMickey Jin @patch1t Brandon Dalton @partyD0lphin Red CanaryCsaba Fitzl @theevilbit Offensive SecurityRıza Sabuncu @rizasabuncu JeongOhKyea Tingting Yin Tsinghua UniversityAleksandar Nikolic Cisco Talosan anonymous researcher ryuzaki Murray Mike Arsenii Kostromin (0x3c3e) Félix Poulin-Bélanger David Pan Ogea Xinru Chi Pangu LabNed Williamson Google Project ZeroPan ZhenPeng STAR Labs SG PteZweig Kunlun LabJoshua Jones Zhuowei Zhang Adam M. Guilherme Rambo Best Buddy AppsCVE-2023-0433 CVE-2023-0512 Antonio Zekic @antoniozekic John Aakerblom @jaakerblom Mohamed GHANNAM @_simo36 Mohamed GHANNAM Mohamed Ghannam @_simo36 Yiğit Can YILMAZ @yilmazcanyigit Itay Iellin General Motors Product Cyber SecurityJianjun Dai 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research InstituteJubaer Alnazi TRS Group of CompaniesMeysam Firouzi @R00tkitSMM Mbition Mercedesjzhu Trend Micro Zero Day InitiativePan ZhenPeng @Peterpan0927 STAR Labs SG PteZechao Cai @Zech4o Zhejiang UniversityAdam Doupé ASU SEFCOMsqrtpwn an anonymous researcher Red CanaryMilan Tenk F FArthur Valiev FAbhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopaldevelopStorm Anton Spivak Jubaer Alnazi Jabin TRS Group Of Companies Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba GroupXin Huang @11iaxH Gertjan Franken imecKU Leuven hazbinhotel Trend Micro Zero Day InitiativeHyeon Park @tree_segment Team ApplePIEGeorgy Kucherin @kucher1n KasperskyLeonid Bezvershenko @bzvr_ KasperskyBoris Larin @oct0xor Kaspersky KasperskyValentin Pashkov KasperskyAnonymous Trend Micro Zero Day InitiativeDohyun Lee @l33d0hyun SSD Labscrixer @pwning_me SSD Labs product-security@apple.com Mickey Jin @patch1t FFRI Security IncKoh M. Nakagawa FFRI Security Inc Offensive SecurityMikko Kenttälä ) @Turmio_ SensorFuKhiem Tran Masahiro Kawada @kawakatz GMO Cybersecurity by IeraeCVE-2023-0049 CVE-2023-0051 CVE-2023-0054 CVE-2023-0288 Chan Shue Long Offensive SecurityJunoh Lee at Theori CVE-2022-43551 CVE-2022-43552 ABC Research s.r.o.
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.7.5 | 11.7.5 |
Apple iOS, iPadOS, and watchOS | <16.4 | 16.4 |
Apple iOS, iPadOS, and watchOS | <16.4 | 16.4 |
Apple iOS, iPadOS, and watchOS | <15.7.4 | 15.7.4 |
Apple iOS, iPadOS, and watchOS | <15.7.4 | 15.7.4 |
Apple iOS, iPadOS, and watchOS | <15.7.4 | |
Apple iOS, iPadOS, and watchOS | >=16.0<16.4 | |
iStyle @cosme iPhone OS | <15.7.4 | |
iStyle @cosme iPhone OS | >=16.0<16.4 | |
Apple iOS and macOS | <11.7.5 | |
Apple iOS and macOS | >=12.0.0<12.6.4 | |
Apple iOS and macOS | >=13.0<13.3 | |
macOS | <12.6.4 | 12.6.4 |
macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-32366 is an out-of-bounds write vulnerability in FontParser that has been fixed with improved input validation.
CVE-2023-32366 affects Apple macOS Ventura versions up to and excluding 13.3.
CVE-2023-32366 affects Apple iOS versions up to and excluding 16.4.
CVE-2023-32366 affects Apple iPadOS versions up to and excluding 16.4.
To fix CVE-2023-32366, update to a version of Apple macOS Ventura, Apple iOS, or Apple iPadOS that is equal to or above the specified remedy versions in the affected software section.