First published: Wed Oct 25 2023(Updated: )
Model I/O. The issue was addressed with improved memory handling.
Credit: Michael DePlante @izobashi Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day Initiative product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Ventura | <13.6.1 | 13.6.1 |
Apple macOS Monterey | <12.7.1 | 12.7.1 |
Apple macOS Sonoma | <14.1 | 14.1 |
Apple macOS | >=12.0<12.7.1 | |
Apple macOS | >=13.0<13.6.1 | |
Apple macOS | >=14.0<14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-42856.
The affected software includes macOS Sonoma 14.1, macOS Ventura 13.6.1, and macOS Monterey 12.7.1.
Processing a file may lead to unexpected app termination or arbitrary code execution.
The issue was addressed with improved memory handling.
Update your operating system to macOS Sonoma 14.1, macOS Ventura 13.6.1, or macOS Monterey 12.7.1.