An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave, macOS Big Sur 11.4, watchOS 7.5. Processing a maliciously crafted font may result in the disclosure of process memory.
References
Link | Resource |
---|---|
https://support.apple.com/en-us/HT212528 | Vendor Advisory |
https://support.apple.com/en-us/HT212529 | Vendor Advisory |
https://support.apple.com/en-us/HT212532 | Vendor Advisory |
https://support.apple.com/en-us/HT212533 | Vendor Advisory |
https://support.apple.com/en-us/HT212600 | Vendor Advisory |
https://support.apple.com/en-us/HT212603 | Vendor Advisory |
https://support.apple.com/en-us/HT212528 | Vendor Advisory |
https://support.apple.com/en-us/HT212529 | Vendor Advisory |
https://support.apple.com/en-us/HT212532 | Vendor Advisory |
https://support.apple.com/en-us/HT212533 | Vendor Advisory |
https://support.apple.com/en-us/HT212600 | Vendor Advisory |
https://support.apple.com/en-us/HT212603 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.apple.com/en-us/HT212528 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT212529 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT212532 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT212533 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT212600 - Vendor Advisory | |
References | () https://support.apple.com/en-us/HT212603 - Vendor Advisory |
22 Sep 2021, 14:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
14 Sep 2021, 20:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.5 |
References | (MISC) https://support.apple.com/en-us/HT212600 - Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212532 - Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212533 - Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212603 - Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212529 - Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212528 - Vendor Advisory | |
CPE | cpe:2.3:o:apple:mac_os_x:10.15.5:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.4:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.6:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:* cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.6:-:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.3:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.2:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.1:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.6:supplemental_update:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:* |
|
CWE | CWE-125 |
08 Sep 2021, 14:55
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-08 14:15
Updated : 2024-11-21 06:04
NVD link : CVE-2021-30733
Mitre link : CVE-2021-30733
CVE.ORG link : CVE-2021-30733
JSON object : View
Products Affected
apple
- iphone_os
- watchos
- mac_os_x
- tvos
- macos
- ipados
CWE
CWE-125
Out-of-bounds Read