Vulnerability Name: | CVE-2021-30939 (CCN-215082) | ||||||||||||
Assigned: | 2021-08-24 | ||||||||||||
Published: | 2021-08-24 | ||||||||||||
Updated: | 2022-02-22 | ||||||||||||
Summary: | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing a maliciously crafted image may lead to arbitrary code execution. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-30939 Source: XF Type: UNKNOWN appleios-cve202130939-code-exec(215082) Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212975 Source: CCN Type: Apple security document HT212976 About the security content of iOS 15.2 and iPadOS 15.2 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212976 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212978 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212979 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212980 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212981 Source: MISC Type: Exploit, Third Party Advisory https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1414 Source: CCN Type: ZDI-22-358 Apple macOS ModelIO ABC File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability Source: CCN Type: ZDI-22-359 Apple macOS ImageIO DDS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability Source: MISC Type: Third Party Advisory, VDB Entry https://www.zerodayinitiative.com/advisories/ZDI-22-359/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |