ID

VAR-202212-1751


CVE

CVE-2022-42856


TITLE

Debian Security Advisory 5309-1

Trust: 0.1

sources: PACKETSTORM: 170350

DESCRIPTION

A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1.. For the stable distribution (bullseye), these problems have been fixed in version 2.38.3-1~deb11u1. We recommend that you upgrade your webkit2gtk packages. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: webkit2gtk3 security update Advisory ID: RHSA-2023:0016-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:0016 Issue date: 2023-01-04 CVE Names: CVE-2022-42856 ==================================================================== 1. Summary: An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: webkit2gtk3-2.36.7-1.el8_7.1.src.rpm aarch64: webkit2gtk3-2.36.7-1.el8_7.1.aarch64.rpm webkit2gtk3-debuginfo-2.36.7-1.el8_7.1.aarch64.rpm webkit2gtk3-debugsource-2.36.7-1.el8_7.1.aarch64.rpm webkit2gtk3-devel-2.36.7-1.el8_7.1.aarch64.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8_7.1.aarch64.rpm webkit2gtk3-jsc-2.36.7-1.el8_7.1.aarch64.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8_7.1.aarch64.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.aarch64.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8_7.1.aarch64.rpm ppc64le: webkit2gtk3-2.36.7-1.el8_7.1.ppc64le.rpm webkit2gtk3-debuginfo-2.36.7-1.el8_7.1.ppc64le.rpm webkit2gtk3-debugsource-2.36.7-1.el8_7.1.ppc64le.rpm webkit2gtk3-devel-2.36.7-1.el8_7.1.ppc64le.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8_7.1.ppc64le.rpm webkit2gtk3-jsc-2.36.7-1.el8_7.1.ppc64le.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8_7.1.ppc64le.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.ppc64le.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8_7.1.ppc64le.rpm s390x: webkit2gtk3-2.36.7-1.el8_7.1.s390x.rpm webkit2gtk3-debuginfo-2.36.7-1.el8_7.1.s390x.rpm webkit2gtk3-debugsource-2.36.7-1.el8_7.1.s390x.rpm webkit2gtk3-devel-2.36.7-1.el8_7.1.s390x.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8_7.1.s390x.rpm webkit2gtk3-jsc-2.36.7-1.el8_7.1.s390x.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8_7.1.s390x.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.s390x.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8_7.1.s390x.rpm x86_64: webkit2gtk3-2.36.7-1.el8_7.1.i686.rpm webkit2gtk3-2.36.7-1.el8_7.1.x86_64.rpm webkit2gtk3-debuginfo-2.36.7-1.el8_7.1.i686.rpm webkit2gtk3-debuginfo-2.36.7-1.el8_7.1.x86_64.rpm webkit2gtk3-debugsource-2.36.7-1.el8_7.1.i686.rpm webkit2gtk3-debugsource-2.36.7-1.el8_7.1.x86_64.rpm webkit2gtk3-devel-2.36.7-1.el8_7.1.i686.rpm webkit2gtk3-devel-2.36.7-1.el8_7.1.x86_64.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8_7.1.i686.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8_7.1.x86_64.rpm webkit2gtk3-jsc-2.36.7-1.el8_7.1.i686.rpm webkit2gtk3-jsc-2.36.7-1.el8_7.1.x86_64.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8_7.1.i686.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8_7.1.x86_64.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.i686.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.x86_64.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8_7.1.i686.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8_7.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-42856 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. Safari 16.2 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-12-13-7 tvOS 16.2 tvOS 16.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213535. Accounts Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: A user may be able to view sensitive user information Description: This issue was addressed with improved data protection. CVE-2022-42843: Mickey Jin (@patch1t) AppleAVD Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Parsing a maliciously crafted video file may lead to kernel code execution Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2022-46694: Andrey Labunets and Nikita Tarakanov AppleMobileFileIntegrity Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to bypass Privacy preferences Description: This issue was addressed by enabling hardened runtime. CVE-2022-42865: Wojciech Reguła (@_r3ggi) of SecuRing AVEVideoEncoder Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: A logic issue was addressed with improved checks. CVE-2022-42848: ABC Research s.r.o ImageIO Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing a maliciously crafted file may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2022-46693: Mickey Jin (@patch1t) ImageIO Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Parsing a maliciously crafted TIFF file may lead to disclosure of user information Description: The issue was addressed with improved memory handling. CVE-2022-42851: Mickey Jin (@patch1t) IOHIDFamily Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved state handling. CVE-2022-42864: Tommy Muir (@Muirey03) IOMobileFrameBuffer Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2022-46690: John Aakerblom (@jaakerblom) Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with additional validation. CVE-2022-46689: Ian Beer of Google Project Zero Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Connecting to a malicious NFS server may lead to arbitrary code execution with kernel privileges Description: The issue was addressed with improved bounds checks. CVE-2022-46701: Felix Poulin-Belanger Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: A remote user may be able to cause kernel code execution Description: The issue was addressed with improved memory handling. CVE-2022-42842: pattern-f (@pattern_F_) of Ant Security Light-Year Lab Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-42845: Adam Doupé of ASU SEFCOM libxml2 Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: A remote user may be able to cause unexpected app termination or arbitrary code execution Description: An integer overflow was addressed through improved input validation. CVE-2022-40303: Maddie Stone of Google Project Zero libxml2 Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: A remote user may be able to cause unexpected app termination or arbitrary code execution Description: This issue was addressed with improved checks. CVE-2022-40304: Ned Williamson and Nathan Wachholz of Google Project Zero Preferences Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to use arbitrary entitlements Description: A logic issue was addressed with improved state management. CVE-2022-42855: Ivan Fratric of Google Project Zero Safari Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Visiting a website that frames malicious content may lead to UI spoofing Description: A spoofing issue existed in the handling of URLs. CVE-2022-46695: KirtiKumar Anandrao Ramchandani Software Update Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: A user may be able to elevate privileges Description: An access issue existed with privileged API calls. CVE-2022-42849: Mickey Jin (@patch1t) Weather Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: An app may be able to read sensitive location information Description: The issue was addressed with improved handling of caches. CVE-2022-42866: an anonymous researcher WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. WebKit Bugzilla: 245521 CVE-2022-42867: Maddie Stone of Google Project Zero WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory consumption issue was addressed with improved memory handling. WebKit Bugzilla: 245466 CVE-2022-46691: an anonymous researcher WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may bypass Same Origin Policy Description: A logic issue was addressed with improved state management. WebKit Bugzilla: 246783 CVE-2022-46692: KirtiKumar Anandrao Ramchandani WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may result in the disclosure of process memory Description: The issue was addressed with improved memory handling. CVE-2022-42852: hazbinhotel working with Trend Micro Zero Day Initiative WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. WebKit Bugzilla: 246942 CVE-2022-46696: Samuel Groß of Google V8 Security WebKit Bugzilla: 247562 CVE-2022-46700: Samuel Groß of Google V8 Security WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may disclose sensitive user information Description: A logic issue was addressed with improved checks. CVE-2022-46698: Dohyun Lee (@l33d0hyun) of SSD Secure Disclosure Labs & DNSLab, Korea Univ. WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. WebKit Bugzilla: 247420 CVE-2022-46699: Samuel Groß of Google V8 Security WebKit Bugzilla: 244622 CVE-2022-42863: an anonymous researcher WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation and later), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution. WebKit Bugzilla: 248266 CVE-2022-42856: Clément Lecigne of Google's Threat Analysis Group Additional recognition Kernel We would like to acknowledge Zweig of Kunlun Lab for their assistance. Safari Extensions We would like to acknowledge Oliver Dunk and Christian R. of 1Password for their assistance. WebKit We would like to acknowledge an anonymous researcher and scarlet for their assistance. Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> System -> Software Update -> Update Software." To check the current version of software, select "Settings -> General -> About." All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEBP+4DupqR5Sgt1DB4RjMIDkeNxkFAmOZFX4ACgkQ4RjMIDke NxkItA/+LIwJ66Odl7Uwp1N/qek5Z/TBuPKlbgTwRZGT3LBVMVmyHTBzebA88aNq Pae1RKQ2Txw4w9Tb7a08eeqRQD51MBoSjTxf23tO1o0B1UR3Hgq3gsOSjh/dTq9V Jvy4DpO15xdVHP3BH/li114JpgR+FoD5Du0rPffL01p6YtqeWMSvnRoCmwNcIqou i2ZObfdrL2WJ+IiDIlMoJ3v+B1tDxOWR6Mn37iRdzl+QgrQMQtP9pSsiAPCntA+y eFM5Hp0JlOMtCfA+xT+LRoZHCbjTCFMRlRbNffGvrNwwdTY4MXrSYlKcIo3yFT2m KSHrQNvqzWhmSLAcHlUNo0lVvtPAlrgyilCYaeRNgRC1+x8KRf/AcErXr23oKknJ lzIF6eVk1K3mxUmR+M+P8+cr14pbrUwJcQlm0In6/8fUulHtcElLE3fJ+HJVImx8 RtvNmuCng5iEK1zlwgDvAKO3EgMrMtduF8aygaCcBmt65GMkHwvOGCDXcIrKfH9U sP4eY7V3t4CQd9TX3Vlmt47MwRTSVuUtMcQeQPhEUTdUbM7UlvtW8igrLvkz9uPn CpuE2mzhd/dJANXvMFBR9A0ilAdJO1QD/uSWL+UbKq4BlyiW5etd8gObQfHqqW3C sh0EwxLh4ATicRS9btAJMwIfK/ulYDWp4yuIsUamDj/sN9xWvXY= =i2O9 -----END PGP SIGNATURE----- . CVE-2022-42846: Willy R. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "iOS 15.7.2 and iPadOS 15.7.2"

Trust: 1.8

sources: NVD: CVE-2022-42856 // VULHUB: VHN-439663 // VULMON: CVE-2022-42856 // PACKETSTORM: 170350 // PACKETSTORM: 170349 // PACKETSTORM: 170367 // PACKETSTORM: 170695 // PACKETSTORM: 170319 // PACKETSTORM: 170317 // PACKETSTORM: 170313 // PACKETSTORM: 170312

AFFECTED PRODUCTS

vendor:applemodel:tvosscope:ltversion:16.2

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:15.7.2

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:15.7.2

Trust: 1.0

vendor:applemodel:macosscope:ltversion:13.1

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:16.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:gteversion:16.0

Trust: 1.0

vendor:applemodel:safariscope:ltversion:16.2

Trust: 1.0

sources: NVD: CVE-2022-42856

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2022-42856
value: HIGH

Trust: 1.0

NVD:
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: NVD: CVE-2022-42856

PROBLEMTYPE DATA

problemtype:CWE-843

Trust: 1.1

sources: VULHUB: VHN-439663 // NVD: CVE-2022-42856

TYPE

code execution

Trust: 0.4

sources: PACKETSTORM: 170367 // PACKETSTORM: 170695 // PACKETSTORM: 170319 // PACKETSTORM: 170313

CONFIGURATIONS

sources: NVD: CVE-2022-42856

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-439663

PATCH

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2022-42856

Trust: 0.1

sources: VULMON: CVE-2022-42856

EXTERNAL IDS

db:NVDid:CVE-2022-42856

Trust: 2.0

db:OPENWALLid:OSS-SECURITY/2022/12/26/1

Trust: 1.1

db:PACKETSTORMid:170317

Trust: 0.2

db:PACKETSTORMid:170313

Trust: 0.2

db:PACKETSTORMid:170350

Trust: 0.2

db:PACKETSTORMid:170319

Trust: 0.2

db:PACKETSTORMid:170349

Trust: 0.2

db:PACKETSTORMid:170367

Trust: 0.2

db:PACKETSTORMid:170312

Trust: 0.2

db:PACKETSTORMid:170374

Trust: 0.1

db:VULHUBid:VHN-439663

Trust: 0.1

db:VULMONid:CVE-2022-42856

Trust: 0.1

db:PACKETSTORMid:170695

Trust: 0.1

sources: VULHUB: VHN-439663 // VULMON: CVE-2022-42856 // PACKETSTORM: 170350 // PACKETSTORM: 170349 // PACKETSTORM: 170367 // PACKETSTORM: 170695 // PACKETSTORM: 170319 // PACKETSTORM: 170317 // PACKETSTORM: 170313 // PACKETSTORM: 170312 // NVD: CVE-2022-42856

REFERENCES

url:https://support.apple.com/en-us/ht213516

Trust: 1.2

url:https://support.apple.com/en-us/ht213531

Trust: 1.2

url:https://support.apple.com/en-us/ht213532

Trust: 1.2

url:https://support.apple.com/en-us/ht213535

Trust: 1.2

url:https://support.apple.com/en-us/ht213537

Trust: 1.2

url:http://seclists.org/fulldisclosure/2022/dec/21

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/dec/22

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/dec/23

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/dec/26

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/dec/28

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2022/12/26/1

Trust: 1.1

url:https://security.gentoo.org/glsa/202305-32

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-42856

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-42852

Trust: 0.5

url:https://www.apple.com/support/security/pgp/

Trust: 0.5

url:https://support.apple.com/en-us/ht201222.

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-46692

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-46698

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-46700

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-42867

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-46699

Trust: 0.3

url:https://www.apple.com/itunes/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-42856

Trust: 0.2

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-46691

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42863

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42848

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42855

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-40303

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-40304

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-42864

Trust: 0.2

url:https://nvd.nist.gov

Trust: 0.1

url:https://security-tracker.debian.org/tracker/wpewebkit

Trust: 0.1

url:https://security-tracker.debian.org/tracker/webkit2gtk

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:0016

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://support.apple.com/ht213597.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-46696

Trust: 0.1

url:https://support.apple.com/ht213537.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42849

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42842

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42845

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42865

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42851

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42843

Trust: 0.1

url:https://support.apple.com/ht213535.

Trust: 0.1

url:https://support.apple.com/ht213516.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42861

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42846

Trust: 0.1

url:https://support.apple.com/ht213531.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-46689

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42840

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42837

Trust: 0.1

sources: VULHUB: VHN-439663 // VULMON: CVE-2022-42856 // PACKETSTORM: 170350 // PACKETSTORM: 170349 // PACKETSTORM: 170367 // PACKETSTORM: 170695 // PACKETSTORM: 170319 // PACKETSTORM: 170317 // PACKETSTORM: 170313 // PACKETSTORM: 170312 // NVD: CVE-2022-42856

CREDITS

Apple

Trust: 0.5

sources: PACKETSTORM: 170695 // PACKETSTORM: 170319 // PACKETSTORM: 170317 // PACKETSTORM: 170313 // PACKETSTORM: 170312

SOURCES

db:VULHUBid:VHN-439663
db:VULMONid:CVE-2022-42856
db:PACKETSTORMid:170350
db:PACKETSTORMid:170349
db:PACKETSTORMid:170367
db:PACKETSTORMid:170695
db:PACKETSTORMid:170319
db:PACKETSTORMid:170317
db:PACKETSTORMid:170313
db:PACKETSTORMid:170312
db:NVDid:CVE-2022-42856

LAST UPDATE DATE

2024-04-27T08:28:40.582000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-439663date:2023-01-09T00:00:00
db:VULMONid:CVE-2022-42856date:2022-12-15T00:00:00
db:NVDid:CVE-2022-42856date:2023-05-30T06:15:29.513

SOURCES RELEASE DATE

db:VULHUBid:VHN-439663date:2022-12-15T00:00:00
db:VULMONid:CVE-2022-42856date:2022-12-15T00:00:00
db:PACKETSTORMid:170350date:2023-01-02T14:20:15
db:PACKETSTORMid:170349date:2023-01-02T14:19:00
db:PACKETSTORMid:170367date:2023-01-04T14:30:38
db:PACKETSTORMid:170695date:2023-01-24T16:40:18
db:PACKETSTORMid:170319date:2022-12-22T02:13:43
db:PACKETSTORMid:170317date:2022-12-22T02:12:53
db:PACKETSTORMid:170313date:2022-12-22T02:11:27
db:PACKETSTORMid:170312date:2022-12-22T02:11:02
db:NVDid:CVE-2022-42856date:2022-12-15T19:15:25.123