A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Processing a maliciously crafted image may lead to arbitrary code execution.
References
Link | Resource |
---|---|
https://support.apple.com/en-us/HT212600 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212601 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212602 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212604 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212605 | Release Notes Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-353/ | Third Party Advisory VDB Entry |
https://support.apple.com/en-us/HT212600 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212601 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212602 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212604 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212605 | Release Notes Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-353/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.apple.com/en-us/HT212600 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT212601 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT212602 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT212604 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT212605 - Release Notes, Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-22-353/ - Third Party Advisory, VDB Entry |
22 Feb 2022, 14:48
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-353/ - Third Party Advisory, VDB Entry |
16 Feb 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Sep 2021, 23:06
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://support.apple.com/en-us/HT212600 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212604 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212605 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212601 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212602 - Release Notes, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.8 |
CWE | CWE-120 | |
CPE | cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
08 Sep 2021, 14:54
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-08 14:15
Updated : 2024-11-21 06:04
NVD link : CVE-2021-30785
Mitre link : CVE-2021-30785
CVE.ORG link : CVE-2021-30785
JSON object : View
Products Affected
apple
- iphone_os
- watchos
- mac_os_x
- tvos
- macos
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')