{"id":"CVE-2023-42852","details":"A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.","modified":"2026-03-15T21:45:09.270088Z","published":"2023-10-25T19:15:10.843Z","related":["ALSA-2024:2126","ALSA-2024:2982","SUSE-SU-2023:4558-1","SUSE-SU-2023:4559-1","SUSE-SU-2023:4561-1","SUSE-SU-2023:4651-1"],"references":[{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2023/Oct/19"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT213981"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT213986"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202401-33"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT213982"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT213984"},{"type":"ADVISORY","url":"https://support.apple.com/kb/HT213984"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2023/Oct/23"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2023/Oct/25"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2023/Oct/27"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5557"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2023/Oct/22"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2023/Oct/24"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT213987"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT213988"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2023/11/15/1"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-42852.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"17.1"}]},{"events":[{"introduced":"0"},{"fixed":"16.7.2"}]},{"events":[{"introduced":"17.0"},{"fixed":"17.1"}]},{"events":[{"introduced":"0"},{"fixed":"16.7.2"}]},{"events":[{"introduced":"17.0"},{"fixed":"17.1"}]},{"events":[{"introduced":"14.0"},{"fixed":"14.1"}]},{"events":[{"introduced":"0"},{"fixed":"17.1"}]},{"events":[{"introduced":"0"},{"fixed":"10.1"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}