First published: Wed Oct 25 2023(Updated: )
Pro Res. The issue was addressed with improved memory handling.
Credit: Mingxuan Yang @PPPF00L happybabywu Guang Gong 360 Vulnerability Research Institute product-security@apple.com Mingxuan Yang @PPPF00L 360 Vulnerability Research Institutehappybabywu 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research InstituteMingxuan Yang @PPPF00L 360 Vulnerability Research Institutehappybabywu 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research InstituteMingxuan Yang @PPPF00L 360 Vulnerability Research Institutehappybabywu 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research Institute
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Ventura | <13.6.1 | 13.6.1 |
Apple iOS | <16.7.2 | 16.7.2 |
Apple iPadOS | <16.7.2 | 16.7.2 |
Apple iOS | <17.1 | 17.1 |
Apple iPadOS | <17.1 | 17.1 |
Apple macOS Sonoma | <14.1 | 14.1 |
Apple iPadOS | <16.7.2 | |
Apple iPadOS | >=17.0<17.1 | |
Apple iPhone OS | <16.7.2 | |
Apple iPhone OS | >=17.0<17.1 | |
Apple macOS | >=13.0<13.6.1 | |
Apple macOS | >=14.0<14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-42841.
The title of the vulnerability is Pro Res. The issue was addressed with improved memory handling.
The vulnerability allows an app to execute arbitrary code with kernel privileges and has been fixed in various Apple software versions.
The affected Apple software versions are macOS Sonoma 14.1, iOS 16.7.2 and iPadOS 16.7.2, and macOS Ventura 13.6.1.
You can fix this vulnerability by updating to the following software versions: macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1, and macOS Ventura 13.6.1.