7.8 CVE-2023-32434
Enriched by CISA CISA Kev Catalog
An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.5.2, macOS Big Sur 11.7.8, iOS 15.7.7 and iPadOS 15.7.7, macOS Monterey 12.6.7, watchOS 8.8.1, iOS 16.5.1 and iPadOS 16.5.1, macOS Ventura 13.4.1. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
https://nvd.nist.gov/vuln/detail/CVE-2023-32434
Categories
CWE-190 : Integer Overflow or Wraparound
The product performs a calculation that canproduce an integer overflow or wraparound when the logicassumes that the resulting value will always be larger thanthe original value. This occurs when an integer value isincremented to a value that is too large to store in theassociated representation. When this occurs, the value maybecome a very small or negative number. The terms "overflow" and "wraparound" areused interchangeably by some people, but they can havemore precise distinctions by others. See TerminologyNotes. The terms "overflow" and "wraparound" areused interchangeably by some people, but they can havemore precise distinctions by others. See TerminologyNotes. Alternate spellings of "wraparound" This weakness can often be detected using automated static analysis tools. Many modern tools use data flow analysis or constraint-based techniques to minimize the number of false positives. Sometimes, evidence of this weakness can be detected using dynamic tools and techniques that interact with the product using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The product's operation may slow down, but it should not become unstable, crash, or generate incorrect results. Ensure that all protocols are strictly defined, such that all out-of-bounds behavior can be identified simply, and require strict conformance to the protocol. For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server. Examine compiler warnings closely and eliminate problems with potential security implications, such as signed / unsigned mismatch in memory operations, or use of uninitialized variables. Even if the weakness is rarely exploitable, a single failure may lead to the compromise of the entire system. Chain: Javascript engine code does not perform a length check (CWE-1284) leading to integer overflow (CWE-190) causing allocation of smaller buffer than expected (CWE-131) resulting in a heap-based buffer overflow (CWE-122) Font rendering library does not properlyhandle assigning a signed short value to an unsignedlong (CWE-195), leading to an integer wraparound(CWE-190), causing too small of a buffer (CWE-131),leading to an out-of-bounds write(CWE-787). Chain: in a web browser, an unsigned 64-bit integer is forcibly cast to a 32-bit integer (CWE-681) and potentially leading to an integer overflow (CWE-190). If an integer overflow occurs, this can cause heap memory corruption (CWE-122) Chain: Python library does not limit the resources used to process images that specify a very large number of bands (CWE-1284), leading to excessive memory consumption (CWE-789) or an integer overflow (CWE-190). Chain: 3D renderer has an integer overflow (CWE-190) leading to write-what-where condition (CWE-123) using a crafted image. Chain: improper input validation (CWE-20) leads to integer overflow (CWE-190) in mobile OS, as exploited in the wild per CISA KEV. Chain: improper input validation (CWE-20) leads to integer overflow (CWE-190) in mobile OS, as exploited in the wild per CISA KEV. Chain: unexpected sign extension (CWE-194) leads to integer overflow (CWE-190), causing an out-of-bounds read (CWE-125) Chain: compiler optimization (CWE-733) removes or modifies code used to detect integer overflow (CWE-190), allowing out-of-bounds write (CWE-787). Chain: integer overflow (CWE-190) causes a negative signed value, which later bypasses a maximum-only check (CWE-839), leading to heap-based buffer overflow (CWE-122). Chain: integer overflow leads to use-after-free Chain: integer overflow in securely-coded mail program leads to buffer overflow. In 2005, this was regarded as unrealistic to exploit, but in 2020, it was rediscovered to be easier to exploit due to evolutions of the technology. Integer overflow via a large number of arguments. Integer overflow in OpenSSH as listed in the demonstrative examples. Image with large width and height leads to integer overflow. Length value of -1 leads to allocation of 0 bytes and resultant heap overflow. Length value of -1 leads to allocation of 0 bytes and resultant heap overflow. chain: unchecked message size metadata allows integer overflow (CWE-190) leading to buffer overflow (CWE-119). Chain: an integer overflow (CWE-190) in the image size calculation causes an infinite loop (CWE-835) which sequentially allocates buffers without limits (CWE-1325) until the stack is full.
References
134c704f-9b21-4f2e-91b3-4a467353bcc0
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-20... US Government Resource |
af854a3a-2127-422b-91ae-364da2661108
| http://seclists.org/fulldisclosure/2023/Oct/20 Mailing List Third Party Advisory |
| https://support.apple.com/en-us/HT213808 Vendor Advisory |
| https://support.apple.com/en-us/HT213809 Vendor Advisory |
| https://support.apple.com/en-us/HT213810 Vendor Advisory |
| https://support.apple.com/en-us/HT213811 Vendor Advisory |
| https://support.apple.com/en-us/HT213812 Vendor Advisory |
| https://support.apple.com/en-us/HT213813 Vendor Advisory |
| https://support.apple.com/en-us/HT213814 Vendor Advisory |
| https://support.apple.com/kb/HT213990 Vendor Advisory |
product-security@apple.com
| http://seclists.org/fulldisclosure/2023/Oct/20 Mailing List Third Party Advisory |
| https://support.apple.com/en-us/HT213808 Vendor Advisory |
| https://support.apple.com/en-us/HT213809 Vendor Advisory |
| https://support.apple.com/en-us/HT213810 Vendor Advisory |
| https://support.apple.com/en-us/HT213811 Vendor Advisory |
| https://support.apple.com/en-us/HT213812 Vendor Advisory |
| https://support.apple.com/en-us/HT213813 Vendor Advisory |
| https://support.apple.com/en-us/HT213814 Vendor Advisory |
| https://support.apple.com/kb/HT213990 Vendor Advisory |
AFFECTED (from MITRE)
| Vendor | Product | Versions |
|---|---|---|
| Apple | macOS |
|
| Apple | iOS and iPadOS |
|
| Apple | iOS and iPadOS |
|
| Apple | watchOS |
|
| Apple | watchOS |
|
| Apple | macOS |
|
| Apple | macOS |
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | ||
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* | < 15.7.7 | |
| cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* | >= 16.0 | < 16.5.1 |
| cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* | < 15.7.7 | |
| cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* | >= 16.0 | < 16.5.1 |
| cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | >= 11.0 | < 11.7.8 |
| cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | >= 12.0.0 | < 12.6.7 |
| cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | >= 13.0 | < 13.4.1 |
| cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* | < 8.8.1 | |
| cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* | >= 9.0 | < 9.5.2 |
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
| No known exploits |
Other Nist (github, ...)
| Url |
|---|
| No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| 92 | Forced Integer Overflow |
High |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
