{"uuid": "558311a9-7b86-4404-913a-b382614935b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32948", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1170", "content": "kernel r/w exploit for iOS 15 and macOS 12 \n*\n\u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u044f\u0435\u0442 4 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438:\nCVE-2022-32845 : aned signature check bypass for model.hwx.\nCVE-2022-32948 : DeCxt::FileIndexToWeight() OOB Read due to lack of array index validation.\nCVE-2022-42805 : ZinComputeProgramUpdateMutables() potential arbitrary read due to Integer overflow issue.\nCVE-2022-32899 : DeCxt::RasterizeScaleBiasData() Buffer underflow due to integer overflow issue.\n\n\u041f\u0440\u043e\u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043e \u043d\u0430:\niPhone12 Pro (iPhone13,3) with iOS 15.5.\niPad Pro (iPad8,10) with iPadOS 15.5.\niPhone11 Pro (iPhone12,3) with iOS 15.4.1.\nMacBookAir10,1 M1 with macOS 12.4.", "creation_timestamp": "2022-11-11T21:17:44.000000Z"}