CVE-2021-30926

Description: A memory corruption issue in the processing of ICC profiles was addressed with improved input validation. This issue is fixed in macOS Monterey 12.1, watchOS 8.3, iOS 15.2 and iPadOS 15.2, tvOS 15.2. Processing a maliciously crafted image may lead to arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:33

Type Values Removed Values Added
References (CONFIRM) https://support.apple.com/kb/HT212872 - Vendor Advisory () https://support.apple.com/kb/HT212872 -
References (MISC) https://support.apple.com/en-us/HT212975 - Vendor Advisory () https://support.apple.com/en-us/HT212975 -
References (MISC) https://support.apple.com/en-us/HT212980 - Vendor Advisory () https://support.apple.com/en-us/HT212980 -
References (CONFIRM) https://support.apple.com/kb/HT212871 - Vendor Advisory () https://support.apple.com/kb/HT212871 -
References (MISC) https://support.apple.com/en-us/HT212976 - Vendor Advisory () https://support.apple.com/en-us/HT212976 -
References (MISC) https://support.apple.com/en-us/HT212978 - Vendor Advisory () https://support.apple.com/en-us/HT212978 -
References (CONFIRM) https://support.apple.com/kb/HT212868 - Vendor Advisory () https://support.apple.com/kb/HT212868 -

11 Oct 2022, 19:34

Type Values Removed Values Added
References (CONFIRM) https://support.apple.com/kb/HT212868 - (CONFIRM) https://support.apple.com/kb/HT212868 - Vendor Advisory
References (CONFIRM) https://support.apple.com/kb/HT212872 - (CONFIRM) https://support.apple.com/kb/HT212872 - Vendor Advisory
References (CONFIRM) https://support.apple.com/kb/HT212871 - (CONFIRM) https://support.apple.com/kb/HT212871 - Vendor Advisory
CPE cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*
First Time Apple mac Os X

26 May 2022, 06:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT212868 -
  • (CONFIRM) https://support.apple.com/kb/HT212872 -
  • (CONFIRM) https://support.apple.com/kb/HT212871 -

28 Dec 2021, 20:07

Type Values Removed Values Added
CPE cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
CWE CWE-787
References (MISC) https://support.apple.com/en-us/HT212975 - (MISC) https://support.apple.com/en-us/HT212975 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212980 - (MISC) https://support.apple.com/en-us/HT212980 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212976 - (MISC) https://support.apple.com/en-us/HT212976 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212978 - (MISC) https://support.apple.com/en-us/HT212978 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 7.8

23 Dec 2021, 20:15

Type Values Removed Values Added
Summary ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by the CVE program. Notes: none. Description: A memory corruption issue in the processing of ICC profiles was addressed with improved input validation. This issue is fixed in macOS Monterey 12.1, watchOS 8.3, iOS 15.2 and iPadOS 15.2, tvOS 15.2. Processing a maliciously crafted image may lead to arbitrary code execution.
References
  • (MISC) https://support.apple.com/en-us/HT212975 -
  • (MISC) https://support.apple.com/en-us/HT212980 -
  • (MISC) https://support.apple.com/en-us/HT212976 -
  • (MISC) https://support.apple.com/en-us/HT212978 -

24 Aug 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-24 19:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-30926

Mitre link : CVE-2021-30926

CVE.ORG link : CVE-2021-30926


JSON object : View

Products Affected

apple

  • iphone_os
  • tvos
  • ipados
  • watchos
  • mac_os_x
  • macos
CWE
CWE-787

Out-of-bounds Write