CVE-2021-21797

An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gonitro:nitro_pro:13.31.0.605:*:*:*:*:*:*:*
cpe:2.3:a:gonitro:nitro_pro:13.33.2.645:*:*:*:*:*:*:*

History

21 Oct 2021, 23:01

Type Values Removed Values Added
CPE cpe:2.3:a:gonitro:nitro_pro:13.33.2.645:*:*:*:*:*:*:*
cpe:2.3:a:gonitro:nitro_pro:13.31.0.605:*:*:*:*:*:*:*
References (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 - (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 - Exploit, Mitigation, Third Party Advisory
CWE CWE-415
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 7.8

18 Oct 2021, 13:39

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-18 13:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-21797

Mitre link : CVE-2021-21797

CVE.ORG link : CVE-2021-21797


JSON object : View

Products Affected

gonitro

  • nitro_pro
CWE
CWE-415

Double Free