First published: Mon Jul 24 2023(Updated: )
Model I/O. The issue was addressed with improved checks.
Credit: product-security@apple.com product-security@apple.com Mickey Jin @patch1t Trend Micro Zero Day Initiative Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeMickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t Trend Micro Zero Day Initiative Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day Initiative
Affected Software | Affected Version | How to fix |
---|---|---|
<13.5 | 13.5 | |
<12.6.8 | 12.6.8 | |
Apple macOS | <12.6.8 | |
Apple macOS | >=13.0<13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2023-38421.
CVE-2023-38421 has a severity value of 5.5 (medium).
CVE-2023-38421 was fixed with improved checks in macOS Ventura 13.5 and macOS Monterey 12.6.8.
The affected software for CVE-2023-38421 includes Apple macOS Ventura up to version 13.5, Apple iPadOS up to version 12.6.8, and Apple macOS Monterey up to version 12.6.8.
CVE-2023-38421 may result in the disclosure of process memory when processing a 3D model.