First published: Thu May 18 2023(Updated: )
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information.
Credit: product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.5 | |
Apple iPhone OS | <16.5 | |
Apple macOS | >=13.0<13.4 | |
Apple Safari | <16.5 | |
Apple tvOS | <16.5 | |
Apple watchOS | <9.5 | |
Apple Safari | <16.5 | 16.5 |
Apple iOS | <16.5 | 16.5 |
Apple iPadOS | <16.5 | 16.5 |
Apple macOS Ventura | <13.4 | 13.4 |
Apple tvOS | <16.5 | 16.5 |
Apple watchOS | <9.5 | 9.5 |
Apple Safari | <16.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-32423 is a buffer overflow vulnerability in WebKit that has been fixed in various Apple software versions.
The affected Apple software versions include watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, Safari 16.5, iOS 16.5, and iPadOS 16.5.
CVE-2023-32423 has a severity score of 6.5, which is considered medium.
To fix CVE-2023-32423, make sure to update your Apple software to the fixed versions, such as watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, Safari 16.5, iOS 16.5, and iPadOS 16.5.
You can find more information about CVE-2023-32423 on the Apple support website. Here are some references: [Link 1](https://support.apple.com/en-us/HT213757), [Link 2](https://support.apple.com/en-us/HT213758), [Link 3](https://support.apple.com/en-us/HT213761).