A stack overflow was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted text file may lead to arbitrary code execution.
References
Link | Resource |
---|---|
https://support.apple.com/en-us/HT212146 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212147 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212148 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT212149 | Release Notes Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-758/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
03 Jun 2022, 14:25
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Apr 2021, 22:14
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://support.apple.com/en-us/HT212147 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212146 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212149 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212148 - Release Notes, Vendor Advisory | |
CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.8 |
CWE | CWE-787 |
02 Apr 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-04-02 18:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-1772
Mitre link : CVE-2021-1772
CVE.ORG link : CVE-2021-1772
JSON object : View
Products Affected
apple
- iphone_os
- tvos
- ipados
- watchos
- mac_os_x
- macos
CWE
CWE-787
Out-of-bounds Write