CVE-2022-42837
Summary
| CVE | CVE-2022-42837 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-12-15 19:15:00 UTC |
| Updated | 2023-06-08 00:15:00 UTC |
| Description | An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, watchOS 9.2. A remote user may be able to cause unexpected app termination or arbitrary code execution. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Full Disclosure: APPLE-SA-2022-12-13-8 watchOS 9.2 | FULLDISC | seclists.org | |
| Full Disclosure: APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2 | FULLDISC | seclists.org | |
| About the security content of tvOS 16.2 - Apple Support | CONFIRM | support.apple.com | |
| Full Disclosure: APPLE-SA-2022-12-13-1 iOS 16.2 and iPadOS 16.2 | FULLDISC | seclists.org | |
| About the security content of macOS Ventura 13.1 - Apple Support | MISC | support.apple.com | |
| Full Disclosure: APPLE-SA-2022-12-13-4 macOS Ventura 13.1 | FULLDISC | seclists.org | |
| About the security content of iOS 16.2 and iPadOS 16.2 - Apple Support | MISC | support.apple.com | |
| About the security content of iOS 15.7.2 and iPadOS 15.7.2 - Apple Support | MISC | support.apple.com | |
| About the security content of watchOS 9.2 - Apple Support | MISC | support.apple.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.