Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-42915 (GCVE-0-2023-42915)
Vulnerability from cvelistv5 – Published: 2024-01-23 00:25 – Updated: 2024-02-14 00:46This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2024-02-14T00:46:18.252Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"rejectedReasons": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2023-42915",
"datePublished": "2024-01-23T00:25:19.706Z",
"dateRejected": "2024-02-14T00:46:18.252Z",
"dateReserved": "2023-09-14T19:05:11.463Z",
"dateUpdated": "2024-02-14T00:46:18.252Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}
CERTFR-2024-AVI-0062
Vulnerability from certfr_avis - Published: 2024-01-23 - Updated: 2024-02-01
De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et une exécution de code arbitraire à distance.
D'après l'éditeur, la vulnérabilité CVE-2024-23222 est activement exploitée. Apple a également publié des correctifs pour les appareils plus anciens qui ne supportent pas les versions plus récentes d'iOS et iPadOS. Ceux-ci concernent les vulnérabilités CVE-2023-42916 et CVE-2023-42917 qui sont également activement exploitées.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | macOS | macOS Ventura versions antérieures à 13.6.4 | ||
| Apple | N/A | iOS versions 16.x antérieures à 16.7.5 | ||
| Apple | N/A | iPadOS versions 16.x antérieures à 16.7.5 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14.3 | ||
| Apple | N/A | iOS versions 17.x antérieures à 17.3 | ||
| Apple | Safari | Safari versions antérieures à 17.3 | ||
| Apple | macOS | macOS Monterey versions antérieures à 12.7.3 | ||
| Apple | N/A | iPadOS versions 17.x antérieures à 17.3 | ||
| Apple | N/A | iOS versions 15.x antérieures à 15.8.1 | ||
| Apple | N/A | iPadOS versions antérieures à 15.8.1 | ||
| Apple | N/A | visionOS versions antérieures à 1.0.1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "macOS Ventura versions ant\u00e9rieures \u00e0 13.6.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions 16.x ant\u00e9rieures \u00e0 16.7.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions 16.x ant\u00e9rieures \u00e0 16.7.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.3",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions 17.x ant\u00e9rieures \u00e0 17.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 17.3",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Monterey versions ant\u00e9rieures \u00e0 12.7.3",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions 17.x ant\u00e9rieures \u00e0 17.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions 15.x ant\u00e9rieures \u00e0 15.8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 15.8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS versions ant\u00e9rieures \u00e0 1.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23204"
},
{
"name": "CVE-2024-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23208"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42916"
},
{
"name": "CVE-2024-23224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23224"
},
{
"name": "CVE-2024-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23217"
},
{
"name": "CVE-2024-23210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23210"
},
{
"name": "CVE-2023-42935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42935"
},
{
"name": "CVE-2023-42937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42937"
},
{
"name": "CVE-2023-40528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40528"
},
{
"name": "CVE-2023-42887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42887"
},
{
"name": "CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"name": "CVE-2024-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23213"
},
{
"name": "CVE-2024-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23219"
},
{
"name": "CVE-2024-23211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23211"
},
{
"name": "CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"name": "CVE-2023-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42915"
},
{
"name": "CVE-2024-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23207"
},
{
"name": "CVE-2024-23203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23203"
},
{
"name": "CVE-2024-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23206"
},
{
"name": "CVE-2024-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23218"
},
{
"name": "CVE-2024-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23209"
},
{
"name": "CVE-2024-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23215"
},
{
"name": "CVE-2023-42888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42888"
},
{
"name": "CVE-2024-23223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23223"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2024-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23212"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2024-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23214"
}
],
"initial_release_date": "2024-01-23T00:00:00",
"last_revision_date": "2024-02-01T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0062",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-23T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 Apple HT214070.",
"revision_date": "2024-02-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un\ncontournement de la politique de s\u00e9curit\u00e9 et une ex\u00e9cution de code\narbitraire \u00e0 distance.\n\nD\u0027apr\u00e8s l\u0027\u00e9diteur, la vuln\u00e9rabilit\u00e9 CVE-2024-23222 est activement\nexploit\u00e9e. \u003cspan class=\"mx_EventTile_body\" dir=\"auto\"\u003eApple a \u00e9galement\npubli\u00e9 des correctifs pour les appareils plus anciens qui ne supportent\npas les versions plus r\u00e9centes d\u0027iOS et iPadOS. Ceux-ci concernent les\nvuln\u00e9rabilit\u00e9s CVE-2023-42916 et CVE-2023-42917 qui sont \u00e9galement\nactivement exploit\u00e9es.\u003c/span\u003e\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214056 du 22 janvier 2024",
"url": "https://support.apple.com/en-us/HT214056"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214059 du 22 janvier 2024",
"url": "https://support.apple.com/en-us/HT214059"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214062 du 22 janvier 2024",
"url": "https://support.apple.com/en-us/HT214062"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214063 du 22 janvier 2024",
"url": "https://support.apple.com/en-us/HT214063"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214070 du 31 janvier 2024",
"url": "https://support.apple.com/en-us/HT214070"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214057 du 22 janvier 2024",
"url": "https://support.apple.com/en-us/HT214057"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214058 du 22 janvier 2024",
"url": "https://support.apple.com/en-us/HT214058"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214061 du 22 janvier 2024",
"url": "https://support.apple.com/en-us/HT214061"
}
]
}
FKIE_CVE-2023-42915
Vulnerability from fkie_nvd - Published: 2024-01-23 01:15 - Updated: 2024-02-14 03:15| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"id": "CVE-2023-42915",
"lastModified": "2024-02-14T03:15:13.210",
"metrics": {},
"published": "2024-01-23T01:15:10.123",
"references": [],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Rejected"
}
GSD-2023-42915
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-42915",
"id": "GSD-2023-42915"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-42915"
],
"details": "Multiple issues were addressed by updating to curl version 8.4.0. This issue is fixed in macOS Ventura 13.6.4, macOS Sonoma 14.2, macOS Monterey 12.7.3, iOS 16.7.5 and iPadOS 16.7.5. Multiple issues in curl.",
"id": "GSD-2023-42915",
"modified": "2023-12-13T01:20:21.684190Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2023-42915",
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D70EB17-D125-4887-B09C-0EC8ACF60308",
"versionEndExcluding": "8.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C2307FA-1412-4727-AD29-541A337A9B97",
"versionEndExcluding": "16.7.5",
"versionStartExcluding": "16.0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78404384-8393-4F57-8076-C84BCFD58B1D",
"versionEndExcluding": "16.7.5",
"versionStartExcluding": "16.0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD0F581-7DA4-428A-A1F5-C9A86DDD99D7",
"versionEndExcluding": "12.7.3",
"versionStartIncluding": "12.0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3916CD8-E6D5-4786-903E-B86026859CE6",
"versionEndExcluding": "13.6.4",
"versionStartIncluding": "13.0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD",
"versionEndExcluding": "14.2",
"versionStartIncluding": "14.0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple issues were addressed by updating to curl version 8.4.0. This issue is fixed in macOS Ventura 13.6.4, macOS Sonoma 14.2, macOS Monterey 12.7.3, iOS 16.7.5 and iPadOS 16.7.5. Multiple issues in curl."
},
{
"lang": "es",
"value": "Se solucionaron varios problemas actualizando a la versi\u00f3n 8.4.0 de curl. Este problema se solucion\u00f3 en macOS Ventura 13.6.4, macOS Sonoma 14.2, macOS Monterey 12.7.3, iOS 16.7.5 y iPadOS 16.7.5. M\u00faltiples problemas en curl."
}
],
"id": "CVE-2023-42915",
"lastModified": "2024-01-29T19:53:50.083",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-01-23T01:15:10.123",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2024/Jan/34"
},
{
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2024/Jan/37"
},
{
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2024/Jan/38"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT214036"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT214057"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT214058"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT214063"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/kb/HT214036"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
GHSA-7258-XMQ8-X5X7
Vulnerability from github – Published: 2024-01-23 03:31 – Updated: 2024-01-29 21:30Multiple issues were addressed by updating to curl version 8.4.0. This issue is fixed in macOS Ventura 13.6.4, macOS Sonoma 14.2, macOS Monterey 12.7.3, iOS 16.7.5 and iPadOS 16.7.5. Multiple issues in curl.
{
"affected": [],
"aliases": [
"CVE-2023-42915"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-01-23T01:15:10Z",
"severity": "HIGH"
},
"details": "Multiple issues were addressed by updating to curl version 8.4.0. This issue is fixed in macOS Ventura 13.6.4, macOS Sonoma 14.2, macOS Monterey 12.7.3, iOS 16.7.5 and iPadOS 16.7.5. Multiple issues in curl.",
"id": "GHSA-7258-xmq8-x5x7",
"modified": "2024-01-29T21:30:26Z",
"published": "2024-01-23T03:31:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42915"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT214036"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT214057"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT214058"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT214063"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT214036"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Jan/34"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Jan/37"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Jan/38"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.