CVE-2023-23514

A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, macOS Big Sur 11.7.5. An app may be able to execute arbitrary code with kernel privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

History

11 Mar 2025, 16:15

Type Values Removed Values Added
References (MISC) https://support.apple.com/en-us/HT213635 - Vendor Advisory () https://support.apple.com/en-us/HT213635 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213670 - () https://support.apple.com/en-us/HT213670 -
References (MISC) https://support.apple.com/en-us/HT213677 - () https://support.apple.com/en-us/HT213677 -
References (MISC) https://support.apple.com/en-us/HT213633 - Vendor Advisory () https://support.apple.com/en-us/HT213633 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213675 - () https://support.apple.com/en-us/HT213675 -

27 Jul 2023, 04:15

Type Values Removed Values Added
Summary A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.2.1, iOS 16.3.1 and iPadOS 16.3.1. An app may be able to execute arbitrary code with kernel privileges.. A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, macOS Big Sur 11.7.5. An app may be able to execute arbitrary code with kernel privileges.
References
  • {'url': 'http://seclists.org/fulldisclosure/2023/Mar/18', 'name': '20230327 APPLE-SA-2023-03-27-4 macOS Monterey 12.6.4', 'tags': [], 'refsource': 'FULLDISC'}
  • {'url': 'https://support.apple.com/kb/HT213675', 'name': 'https://support.apple.com/kb/HT213675', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'https://support.apple.com/kb/HT213670', 'name': 'https://support.apple.com/kb/HT213670', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'https://support.apple.com/kb/HT213677', 'name': 'https://support.apple.com/kb/HT213677', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Mar/17', 'name': '20230327 APPLE-SA-2023-03-27-3 macOS Ventura 13.3', 'tags': [], 'refsource': 'FULLDISC'}
  • {'url': 'http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html', 'name': 'http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Mar/21', 'name': '20230327 APPLE-SA-2023-03-27-5 macOS Big Sur 11.7.5', 'tags': [], 'refsource': 'FULLDISC'}
  • (MISC) https://support.apple.com/en-us/HT213675 -
  • (MISC) https://support.apple.com/en-us/HT213670 -
  • (MISC) https://support.apple.com/en-us/HT213677 -

Information

Published : 2023-02-27 20:15

Updated : 2025-03-11 16:15


NVD link : CVE-2023-23514

Mitre link : CVE-2023-23514


JSON object : View

Products Affected

apple

  • ipados
  • iphone_os
  • macos
CWE
CWE-416

Use After Free