First published: Tue Apr 11 2023(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2023-28205">CVE-2023-28205</a> (WebKit) It is a use-after-free vulnerability that allows attackers to process maliciously crafted web content that may lead to arbitrary code execution. By tricking targets into loading malicious websites under the control of attackers, it is possible to exploit the vulnerability, which could lead to the execution of malware on compromised systems. Maliciously designed web content can cause the execution of arbitrary code, giving attackers access to your device without your knowledge. Apple has fixed this vulnerability with improved memory management. WebKit Bugzilla: 254797 <a href="https://seclists.org/fulldisclosure/2023/Apr/1">https://seclists.org/fulldisclosure/2023/Apr/1</a> <a href="https://seclists.org/fulldisclosure/2023/Apr/2">https://seclists.org/fulldisclosure/2023/Apr/2</a> <a href="https://seclists.org/fulldisclosure/2023/Apr/3">https://seclists.org/fulldisclosure/2023/Apr/3</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apple WebKit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-2185724 is classified as a high severity issue due to its potential for arbitrary code execution.
To mitigate REDHAT-BUG-2185724, ensure that you update your Apple WebKit to the latest available version.
REDHAT-BUG-2185724 enables attackers to execute arbitrary code by processing maliciously crafted web content.
The affected software for REDHAT-BUG-2185724 is Apple WebKit.
In REDHAT-BUG-2185724, a use-after-free vulnerability occurs when the program continues to use a memory location after it has been freed, potentially leading to exploitation.