Vulnerability Name: | CVE-2022-32893 (CCN-233817) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2022-08-17 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2022-08-17 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-11-07 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. | ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-787 CWE-787 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-32893 Source: FULLDISC Type: Mailing List, Third Party Advisory 20220831 APPLE-SA-2022-08-31-1 iOS 12.5.6 Source: FULLDISC Type: Mailing List, Third Party Advisory 20221030 APPLE-SA-2022-10-27-13 watchOS 9 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20220825 WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20220826 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20220829 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20220829 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20220902 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20220913 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2022-0008 Source: XF Type: UNKNOWN apple-ios-cve202232893-code-exec(233817) Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20220830 [SECURITY] [DLA 3087-1] webkit2gtk security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-eada5f24a0 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-ddfeee50c9 Source: GENTOO Type: Third Party Advisory GLSA-202208-39 Source: CCN Type: Apple security document HT213412 About the security content of iOS 15.6.1 and iPadOS 15.6.1 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT213412 Source: CCN Type: Apple security document HT213413 About the security content of macOS Monterey 12.5.1 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT213413 Source: CCN Type: Apple security document HT213414 About the security content of Safari 15.6.1 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT213414 Source: CCN Type: Apple security document HT213428 About the security content of iOS 12.5.6 Source: DEBIAN Type: Third Party Advisory DSA-5219 Source: DEBIAN Type: Third Party Advisory DSA-5220 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |