{"api_version":"1","generated_at":"2026-04-23T02:36:38+00:00","cve":"CVE-2023-41983","urls":{"html":"https://cve.report/CVE-2023-41983","api":"https://cve.report/api/cve/CVE-2023-41983.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-41983","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-41983"},"summary":{"title":"CVE-2023-41983","description":"The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-of-service.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-10-25 19:15:00","updated_at":"2024-01-31 15:15:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/11/15/1","name":"http://www.openwall.com/lists/oss-security/2023/11/15/1","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/19","name":"http://seclists.org/fulldisclosure/2023/Oct/19","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-10-25-2023-1 iOS 17.1 and iPadOS 17.1","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/kb/HT213984","name":"https://support.apple.com/kb/HT213984","refsource":"","tags":[],"title":"About the security content of macOS Sonoma 14.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202401-33","name":"https://security.gentoo.org/glsa/202401-33","refsource":"","tags":[],"title":"WebKitGTK+: Multiple Vulnerabilities (GLSA 202401-33) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/23","name":"http://seclists.org/fulldisclosure/2023/Oct/23","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-10-25-2023-2 iOS 16.7.2 and iPadOS 16.7.2","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5557","name":"https://www.debian.org/security/2023/dsa-5557","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213982","name":"https://support.apple.com/en-us/HT213982","refsource":"MISC","tags":[],"title":"About the security content of iOS 17.1 and iPadOS 17.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: webkitgtk-2.42.2-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213984","name":"https://support.apple.com/en-us/HT213984","refsource":"MISC","tags":[],"title":"About the security content of macOS Sonoma 14.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/27","name":"http://seclists.org/fulldisclosure/2023/Oct/27","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-10-25-2023-9 Safari 17.1","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213986","name":"https://support.apple.com/en-us/HT213986","refsource":"MISC","tags":[],"title":"About the security content of Safari 17.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://support.apple.com/en-us/HT213981","name":"https://support.apple.com/en-us/HT213981","refsource":"MISC","tags":[],"title":"About the security content of iOS 16.7.2 and iPadOS 16.7.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/24","name":"http://seclists.org/fulldisclosure/2023/Oct/24","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-10-25-2023-4 macOS Sonoma 14.1","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-41983","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41983","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"41983","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41983","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41983","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41983","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41983","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41983","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41983","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41983","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"38","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41983","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"39","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-41983","qid":"199922","title":"Ubuntu Security Notification for WebKitGTK Vulnerabilities (USN-6490-1)"},{"cve":"CVE-2023-41983","qid":"284735","title":"Fedora Security Update for webkitgtk (FEDORA-2023-cb3cacfef8)"},{"cve":"CVE-2023-41983","qid":"284770","title":"Fedora Security Update for webkitgtk (FEDORA-2023-11aaf99627)"},{"cve":"CVE-2023-41983","qid":"285123","title":"Fedora Security Update for webkitgtk (FEDORA-2023-8f84dc8e09)"},{"cve":"CVE-2023-41983","qid":"357018","title":"Amazon Linux Security Advisory for webkitgtk4 : ALAS2-2024-2427"},{"cve":"CVE-2023-41983","qid":"378968","title":"Apple Safari Multiple Vulnerabilities (HT213986)"},{"cve":"CVE-2023-41983","qid":"378975","title":"Apple MacOS Sonoma 14.1 Not Installed (HT213984)"},{"cve":"CVE-2023-41983","qid":"6000328","title":"Debian Security Update for webkit2gtk (DSA 5557-1)"},{"cve":"CVE-2023-41983","qid":"610521","title":"Apple iOS 17.1 and iPadOS 17.1 Security Update Missing (HT213982)"},{"cve":"CVE-2023-41983","qid":"610523","title":"Apple iOS 16.7.2 and iPadOS 16.7.2 Security Update Missing (HT213981)"},{"cve":"CVE-2023-41983","qid":"710848","title":"Gentoo Linux WebKitGTK+ Multiple Vulnerabilities (GLSA 202401-33)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-41983","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-of-service."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Processing web content may lead to a denial-of-service"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"16.7"}]}},{"product_name":"Safari","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"17.1"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"14.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://support.apple.com/en-us/HT213981","refsource":"MISC","name":"https://support.apple.com/en-us/HT213981"},{"url":"https://support.apple.com/en-us/HT213986","refsource":"MISC","name":"https://support.apple.com/en-us/HT213986"},{"url":"https://support.apple.com/en-us/HT213984","refsource":"MISC","name":"https://support.apple.com/en-us/HT213984"},{"url":"https://support.apple.com/en-us/HT213982","refsource":"MISC","name":"https://support.apple.com/en-us/HT213982"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/23","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Oct/23"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/19","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Oct/19"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/27","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Oct/27"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/24","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Oct/24"}]}},"nvd":{"publishedDate":"2023-10-25 19:15:00","lastModifiedDate":"2024-01-31 15:15:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"17.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"16.7.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"16.7.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"17.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","versionEndExcluding":"17.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}