Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-44234
PUBLISHED
More InfoOfficial Page
Assigner-apple
Assigner Org ID-286789f9-fbc2-4510-9f9a-43facdede74c
View Known Exploited Vulnerability (KEV) details
Published At-01 Nov, 2024 | 20:41
Updated At-02 Apr, 2026 | 18:07
Rejected At-
▼CVE Numbering Authority (CNA)

The issue was addressed with improved bounds checks. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1, macOS Sequoia 15.1, macOS Sonoma 14.7.1, macOS Ventura 13.7.1, tvOS 18.1, visionOS 2.1, watchOS 11.1. Parsing a maliciously crafted video file may lead to unexpected system termination.

Affected Products
Vendor
Apple Inc.Apple
Product
iOS and iPadOS
Versions
Affected
  • From 0 before 17.7.1 (custom)
  • From 0 before 18.1 (custom)
Vendor
Apple Inc.Apple
Product
macOS
Versions
Affected
  • From 0 before 13.7.1 (custom)
  • From 0 before 14.7.1 (custom)
  • From 0 before 15.1 (custom)
Vendor
Apple Inc.Apple
Product
tvOS
Versions
Affected
  • From 0 before 18.1 (custom)
Vendor
Apple Inc.Apple
Product
visionOS
Versions
Affected
  • From 0 before 2.1 (custom)
Vendor
Apple Inc.Apple
Product
watchOS
Versions
Affected
  • From 0 before 11.1 (custom)
Problem Types
TypeCWE IDDescription
N/AN/AParsing a maliciously crafted video file may lead to unexpected system termination
Type: N/A
CWE ID: N/A
Description: Parsing a maliciously crafted video file may lead to unexpected system termination
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.apple.com/en-us/121563
N/A
https://support.apple.com/en-us/121564
N/A
https://support.apple.com/en-us/121565
N/A
https://support.apple.com/en-us/121566
N/A
https://support.apple.com/en-us/121567
N/A
https://support.apple.com/en-us/121568
N/A
https://support.apple.com/en-us/121569
N/A
https://support.apple.com/en-us/121570
N/A
Hyperlink: https://support.apple.com/en-us/121563
Resource: N/A
Hyperlink: https://support.apple.com/en-us/121564
Resource: N/A
Hyperlink: https://support.apple.com/en-us/121565
Resource: N/A
Hyperlink: https://support.apple.com/en-us/121566
Resource: N/A
Hyperlink: https://support.apple.com/en-us/121567
Resource: N/A
Hyperlink: https://support.apple.com/en-us/121568
Resource: N/A
Hyperlink: https://support.apple.com/en-us/121569
Resource: N/A
Hyperlink: https://support.apple.com/en-us/121570
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-120CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Type: CWE
CWE ID: CWE-120
Description: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found