CVE-2021-21797

An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 Exploit Mitigation Third Party Advisory
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gonitro:nitro_pro:13.31.0.605:*:*:*:*:*:*:*
cpe:2.3:a:gonitro:nitro_pro:13.33.2.645:*:*:*:*:*:*:*

History

21 Nov 2024, 05:48

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 - Exploit, Mitigation, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 - Exploit, Mitigation, Third Party Advisory

Information

Published : 2021-10-18 13:15

Updated : 2024-11-21 05:48


NVD link : CVE-2021-21797

Mitre link : CVE-2021-21797

CVE.ORG link : CVE-2021-21797


JSON object : View

Products Affected

gonitro

  • nitro_pro
CWE
CWE-415

Double Free