Vulnerabilities > CVE-2024-40782 - Use After Free vulnerability in Apple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- http://seclists.org/fulldisclosure/2024/Jul/15
- http://seclists.org/fulldisclosure/2024/Jul/15
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/17
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/21
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/22
- http://seclists.org/fulldisclosure/2024/Jul/23
- http://seclists.org/fulldisclosure/2024/Jul/23
- https://support.apple.com/en-us/HT214116
- https://support.apple.com/en-us/HT214116
- https://support.apple.com/en-us/HT214117
- https://support.apple.com/en-us/HT214117
- https://support.apple.com/en-us/HT214119
- https://support.apple.com/en-us/HT214119
- https://support.apple.com/en-us/HT214121
- https://support.apple.com/en-us/HT214121
- https://support.apple.com/en-us/HT214122
- https://support.apple.com/en-us/HT214122
- https://support.apple.com/en-us/HT214123
- https://support.apple.com/en-us/HT214123
- https://support.apple.com/en-us/HT214124
- https://support.apple.com/en-us/HT214124