First published: Thu Nov 30 2023(Updated: )
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
Credit: product-security@apple.com an anonymous researcher Zhenjiang Zhao Pangu TeamQianxin Junsung Lee Meysam Firouzi @R00tkitSMM Eloi Benoist-Vanderbeken @elvanderb SynacktivCVE-2023-42893 Csaba Fitzl @theevilbit OffSecZhongquan Li @Guluisacat Dawn Security Lab of JingDongCsaba Fitzl @theevilbit Offensive SecurityJoshua Jewett @JoshJewett33 Pwn2car Zoom Offensive Security Team Clément Lecigne Google's Threat Analysis GroupNan Wang @eternalsakura13 360 Vulnerability Research Instituterushikesh nandedkar rushikesh nandedka Noah Roskin-Frazee Pr Kirin @Pwnrin Michael DePlante @izobashi Trend Micro Zero Day Initiative
Affected Software | Affected Version | How to fix |
---|---|---|
debian/webkit2gtk | <=2.36.4-1~deb10u1<=2.38.6-0+deb10u1<=2.42.2-1~deb11u1<=2.42.2-1~deb12u1 | 2.42.5-1~deb11u1 2.42.5-1~deb12u1 2.42.5-1 2.44.1-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.42.5-1 2.44.1-1 |
ubuntu/webkit2gtk | <2.42.3-0ubuntu0.22.04.1 | 2.42.3-0ubuntu0.22.04.1 |
ubuntu/webkit2gtk | <2.42.3-0ubuntu0.23.04.1 | 2.42.3-0ubuntu0.23.04.1 |
ubuntu/webkit2gtk | <2.42.3-0ubuntu0.23.10.1 | 2.42.3-0ubuntu0.23.10.1 |
ubuntu/webkit2gtk | <2.42.3-1 | 2.42.3-1 |
ubuntu/webkit2gtk | <2.42.3 | 2.42.3 |
Apple Multiple Products | ||
Apple macOS | <14.1.2 | 14.1.2 |
tvOS | <17.2 | 17.2 |
Apple iPhone | ||
Apple macOS | ||
Apple TV | ||
Apple Watch | ||
Apple iOS, iPadOS, and watchOS | <10.2 | 10.2 |
redhat/webkitgtk | <2.42.3 | 2.42.3 |
Safari | <17.1.2 | 17.1.2 |
Apple iOS and iPadOS | <15.8.1 | 15.8.1 |
Apple iOS, iPadOS, and macOS | <15.8.1 | 15.8.1 |
Apple iOS and iPadOS | <17.1.2 | 17.1.2 |
Apple iOS, iPadOS, and macOS | <17.1.2 | 17.1.2 |
Apple iOS and iPadOS | <16.7.3 | 16.7.3 |
Apple iOS, iPadOS, and macOS | <16.7.3 | 16.7.3 |
Safari | <17.1.2 | |
Apple iOS, iPadOS, and macOS | <15.8.1 | |
Apple iOS, iPadOS, and macOS | >=16.0<16.7.3 | |
Apple iOS, iPadOS, and macOS | >=17.0<17.1.2 | |
iPhone OS | <15.8.1 | |
iPhone OS | >=16.0<16.7.3 | |
iPhone OS | >=17.0<17.1.2 | |
macOS | >=14.0<14.1.2 | |
Debian Linux | =11.0 | |
Debian Linux | =12.0 | |
Red Hat Fedora | =38 | |
Red Hat Fedora | =39 | |
WebKitGTK+ | <2.42.3 |
Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-42917 is a memory corruption vulnerability in WebKit that allows for arbitrary code execution.
Apple Safari, macOS Sonoma, iOS, and iPadOS versions up to and including 17.1.2 are affected by CVE-2023-42917.
CVE-2023-42917 was fixed with improved locking in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, and Safari 17.1.2.
Yes, the remedy for CVE-2023-42917 is to update to iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, or Safari 17.1.2.
You can find more information about CVE-2023-42917 in the following references: - [Apple Support - HT214031](https://support.apple.com/en-us/HT214031) - [Apple Support - HT214033](https://support.apple.com/en-us/HT214033) - [Apple Support - HT214032](https://support.apple.com/en-us/HT214032)