CVE-2021-30785

A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Processing a maliciously crafted image may lead to arbitrary code execution.
References
Link Resource
https://support.apple.com/en-us/HT212600 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212601 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212602 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212604 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212605 Release Notes Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-22-353/ Third Party Advisory VDB Entry
https://support.apple.com/en-us/HT212600 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212601 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212602 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212604 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212605 Release Notes Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-22-353/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:04

Type Values Removed Values Added
References () https://support.apple.com/en-us/HT212600 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT212600 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT212601 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT212601 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT212602 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT212602 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT212604 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT212604 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT212605 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT212605 - Release Notes, Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-22-353/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-22-353/ - Third Party Advisory, VDB Entry

Information

Published : 2021-09-08 14:15

Updated : 2024-11-21 06:04


NVD link : CVE-2021-30785

Mitre link : CVE-2021-30785

CVE.ORG link : CVE-2021-30785


JSON object : View

Products Affected

apple

  • iphone_os
  • macos
  • mac_os_x
  • tvos
  • watchos
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')