CVE-2021-30926

Description: A memory corruption issue in the processing of ICC profiles was addressed with improved input validation. This issue is fixed in macOS Monterey 12.1, watchOS 8.3, iOS 15.2 and iPadOS 15.2, tvOS 15.2. Processing a maliciously crafted image may lead to arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:04

Type Values Removed Values Added
References () https://support.apple.com/en-us/HT212975 - () https://support.apple.com/en-us/HT212975 -
References () https://support.apple.com/en-us/HT212976 - () https://support.apple.com/en-us/HT212976 -
References () https://support.apple.com/en-us/HT212978 - () https://support.apple.com/en-us/HT212978 -
References () https://support.apple.com/en-us/HT212980 - () https://support.apple.com/en-us/HT212980 -
References () https://support.apple.com/kb/HT212868 - () https://support.apple.com/kb/HT212868 -
References () https://support.apple.com/kb/HT212871 - () https://support.apple.com/kb/HT212871 -
References () https://support.apple.com/kb/HT212872 - () https://support.apple.com/kb/HT212872 -

07 Nov 2023, 03:33

Type Values Removed Values Added
References (CONFIRM) https://support.apple.com/kb/HT212871 - Vendor Advisory () https://support.apple.com/kb/HT212871 -
References (MISC) https://support.apple.com/en-us/HT212980 - Vendor Advisory () https://support.apple.com/en-us/HT212980 -
References (CONFIRM) https://support.apple.com/kb/HT212872 - Vendor Advisory () https://support.apple.com/kb/HT212872 -
References (MISC) https://support.apple.com/en-us/HT212975 - Vendor Advisory () https://support.apple.com/en-us/HT212975 -
References (CONFIRM) https://support.apple.com/kb/HT212868 - Vendor Advisory () https://support.apple.com/kb/HT212868 -
References (MISC) https://support.apple.com/en-us/HT212978 - Vendor Advisory () https://support.apple.com/en-us/HT212978 -
References (MISC) https://support.apple.com/en-us/HT212976 - Vendor Advisory () https://support.apple.com/en-us/HT212976 -

Information

Published : 2021-08-24 19:15

Updated : 2024-11-21 06:04


NVD link : CVE-2021-30926

Mitre link : CVE-2021-30926

CVE.ORG link : CVE-2021-30926


JSON object : View

Products Affected

apple

  • iphone_os
  • ipados
  • macos
  • mac_os_x
  • tvos
  • watchos
CWE
CWE-787

Out-of-bounds Write