A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3. Processing maliciously crafted web content may lead to arbitrary code execution.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2021/Apr/55 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/ | |
https://support.apple.com/en-us/HT212220 | Vendor Advisory |
https://support.apple.com/en-us/HT212221 | Vendor Advisory |
https://support.apple.com/en-us/HT212222 | Vendor Advisory |
https://support.apple.com/en-us/HT212223 | Vendor Advisory |
https://support.apple.com/kb/HT212323 | Vendor Advisory |
https://www.debian.org/security/2021/dsa-4923 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Nov 2023, 03:28
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
09 Jan 2023, 16:41
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
First Time |
Apple ipados
|
|
CPE | cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* |
26 Apr 2022, 17:25
Type | Values Removed | Values Added |
---|---|---|
References | (DEBIAN) https://www.debian.org/security/2021/dsa-4923 - Third Party Advisory | |
First Time |
Debian
Debian debian Linux |
|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
31 May 2021, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 May 2021, 19:35
Type | Values Removed | Values Added |
---|---|---|
References | (FULLDISC) http://seclists.org/fulldisclosure/2021/Apr/55 - Mailing List, Third Party Advisory |
27 Apr 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Apr 2021, 19:23
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://support.apple.com/kb/HT212323 - Vendor Advisory | |
CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* |
26 Apr 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Apr 2021, 17:56
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://support.apple.com/en-us/HT212222 - Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212221 - Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212223 - Vendor Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/ - Mailing List, Third Party Advisory | |
References | (MISC) https://support.apple.com/en-us/HT212220 - Vendor Advisory | |
CPE | cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CWE | CWE-119 |
04 Apr 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Apr 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-04-02 19:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-1844
Mitre link : CVE-2021-1844
CVE.ORG link : CVE-2021-1844
JSON object : View
Products Affected
apple
- safari
- macos
- tvos
- watchos
- iphone_os
- ipados
debian
- debian_linux
fedoraproject
- fedora
CWE
CWE-787
Out-of-bounds Write