An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 | Exploit Mitigation Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 - Exploit, Mitigation, Third Party Advisory |
Information
Published : 2021-10-18 13:15
Updated : 2024-11-21 05:48
NVD link : CVE-2021-21797
Mitre link : CVE-2021-21797
CVE.ORG link : CVE-2021-21797
JSON object : View
Products Affected
gonitro
- nitro_pro
CWE
CWE-415
Double Free