VARIoT IoT vulnerabilities database
| VAR-202110-1429 | CVE-2021-30833 | macOS Vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.0.1. Unpacking a maliciously crafted archive may allow an attacker to write arbitrary files. macOS Exists in unspecified vulnerabilities.Information may be tampered with.
Information about the security content is also available at
https://support.apple.com/HT212869.
AppKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to elevate privileges
Description: A logic issue was addressed with improved state
management.
CVE-2021-30873: Thijs Alkemade of Computest
AppleScript
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted AppleScript binary may
result in unexpected application termination or disclosure of process
memory
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30876: Jeremy Brown, hjy79425575
CVE-2021-30879: Jeremy Brown, hjy79425575
CVE-2021-30877: Jeremy Brown
CVE-2021-30880: Jeremy Brown
Audio
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to elevate privileges
Description: An integer overflow was addressed through improved input
validation.
CVE-2021-30907: Zweig of Kunlun Lab
Bluetooth
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved state
handling.
CVE-2021-30899: Weiteng Chen, Zheng Zhang, and Zhiyun Qian of UC
Riverside, and Yu Wang of Didi Research America
ColorSync
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: A memory corruption issue existed in the processing of
ICC profiles.
CVE-2021-30917: Alexandru-Vlad Niculae and Mateusz Jurczyk of Google
Project Zero
Continuity Camera
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30903: an anonymous researcher
CoreAudio
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted file may disclose user
information
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30905: Mickey Jin (@patch1t) of Trend Micro
CoreGraphics
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted PDF may lead to arbitrary
code execution
Description: An out-of-bounds write was addressed with improved input
validation.
CVE-2021-30919
FileProvider
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Unpacking a maliciously crafted archive may lead to arbitrary
code execution
Description: An input validation issue was addressed with improved
memory handling.
CVE-2021-30881: Simon Huang (@HuangShaomang) and pjf of IceSword Lab
of Qihoo 360
Game Center
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to access information
about a user's contacts
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30895: Denis Tokarev
Game Center
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to read user's gameplay
data
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30896: Denis Tokarev
iCloud
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to elevate their privileges
Description: This issue was addressed with improved checks.
CVE-2021-30906: Cees Elzinga
Intel Graphics Driver
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
state management.
CVE-2021-30824: Antonio Zekic (@antoniozekic) of Diverto
Intel Graphics Driver
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: Multiple out-of-bounds write issues were addressed with
improved bounds checking.
CVE-2021-30901: Zuozhi Fan (@pattern_F_) of Ant Security TianQiong
Lab, Yinyi Wu (@3ndy1) of Ant Security Light-Year Lab, Jack Dates of
RET2 Systems, Inc.
IOGraphics
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30821: Tim Michaud (@TimGMichaud) of Zoom Video
Communications
IOMobileFrameBuffer
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30883: an anonymous researcher
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A use after free issue was addressed with improved
memory management.
CVE-2021-30886: @0xalsr
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30909: Zweig of Kunlun Lab
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30916: Zweig of Kunlun Lab
LaunchServices
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: A logic issue was addressed with improved state
management.
CVE-2021-30864: Ron Hass (@ronhass7) of Perception Point
Login Window
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A person with access to a host Mac may be able to bypass the
Login Window in Remote Desktop for a locked instance of macOS
Description: This issue was addressed with improved checks.
CVE-2021-30813: Benjamin Berger of BBetterTech LLC, Peter Goedtkindt
of Informatique-MTF S.A., an anonymous researcher
Model I/O
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted file may disclose user
information
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30910: Mickey Jin (@patch1t) of Trend Micro
Model I/O
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted USD file may disclose memory
contents
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30911: Rui Yang and Xingwei Lin of Ant Security Light-Year
Lab
Sandbox
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to read sensitive information
Description: A permissions issue was addressed with improved
validation.
CVE-2021-30920: Csaba Fitzl (@theevilbit) of Offensive Security
SMB
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved locking.
CVE-2021-30868: Peter Nguyen Vu Hoang of STAR Labs
SoftwareUpdate
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may gain access to a user's Keychain
items
Description: The issue was addressed with improved permissions logic.
CVE-2021-30912: Kirin (@Pwnrin) and chenyuwang (@mzzzz__) of Tencent
Security Xuanwu Lab
SoftwareUpdate
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An unprivileged application may be able to edit NVRAM
variables
Description: The issue was addressed with improved permissions logic.
CVE-2021-30913: Kirin (@Pwnrin) and chenyuwang (@mzzzz__) of Tencent
Security Xuanwu Lab
UIKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A person with physical access to an iOS device may be
determine characteristics of a user's password in a secure text entry
field
Description: A logic issue was addressed with improved state
management.
CVE-2021-30915: Kostas Angelopoulos
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An attacker in a privileged network position may be able to
bypass HSTS
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30823: David Gullasch of Recurity Labs
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
unexpectedly unenforced Content Security Policy
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30887: Narendra Bhati (@imnarendrabhati) of Suma Soft Pvt.
Ltd.
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious website using Content Security Policy reports may
be able to leak information via redirect behavior
Description: An information leakage issue was addressed.
CVE-2021-30888: Prakash (@1lastBr3ath)
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A buffer overflow issue was addressed with improved
memory handling.
CVE-2021-30889: Chijin Zhou of ShuiMuYuLin Ltd and Tsinghua
wingtecher lab
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may bypass Gatekeeper checks
Description: A logic issue was addressed with improved state
management.
CVE-2021-30861: Wojciech Reguła (@_r3ggi), Ryan Pickren
(ryanpickren.com)
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
universal cross site scripting
Description: A logic issue was addressed with improved state
management.
CVE-2021-30890: an anonymous researcher
Windows Server
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to view the previous logged in
user’s desktop from the fast user switching screen
Description: An authentication issue was addressed with improved
state management.
CVE-2021-30908: ASentientBot
xar
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Unpacking a maliciously crafted archive may allow an attacker
to write arbitrary files
Description: This issue was addressed with improved checks.
CVE-2021-30833: Richard Warren of NCC Group
zsh
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to modify protected parts
of the file system
Description: An inherited permissions issue was addressed with
additional restrictions.
CVE-2021-30892: Jonathan Bar Or of Microsoft
Additional recognition
APFS
We would like to acknowledge Koh M. Nakagawa of FFRI Security, Inc.
for their assistance.
App Support
We would like to acknowledge an anonymous researcher, 漂亮鼠 of 赛博回忆录
for their assistance.
Bluetooth
We would like to acknowledge say2 of ENKI for their assistance.
CUPS
We would like to acknowledge an anonymous researcher for their
assistance.
iCloud
We would like to acknowledge Ryan Pickren (ryanpickren.com) for their
assistance.
Kernel
We would like to acknowledge Anthony Steinhauser of Google's Safeside
project for their assistance.
Mail
We would like to acknowledge Fabian Ising and Damian Poddebniak of
Münster University of Applied Sciences for their assistance.
Managed Configuration
We would like to acknowledge Michal Moravec of Logicworks, s.r.o. for
their assistance.
smbx
We would like to acknowledge Zhongcheng Li (CK01) for their
assistance.
WebKit
We would like to acknowledge Ivan Fratric of Google Project Zero,
Pavel Gromadchuk, an anonymous researcher for their assistance.
Installation note:
This update may be obtained from the Mac App Store
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=3Pcg
-----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202405-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: xar: Unsafe Extraction
Date: May 07, 2024
Bugs: #820641
ID: 202405-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A vulnerability has been discovered in xar, which can lead to privilege
escalation.
Background
==========
xar provides an easily extensible archive format.
Affected packages
=================
Package Vulnerable Unaffected
------------ ------------------- --------------------
app-arch/xar < 1.8.0.0.487.100.1 >= 1.8.0.0.487.100.1
Description
===========
A vulnerability has been discovered in xar. Please review the CVE
identifier referenced below for details.
Impact
======
xar allows for a forward-slash separated path to be specified in the
file name property, e.g. <name>x/foo</name> – as long as it doesn’t
traverse upwards, and the path exists within the current directory. This
means an attacker can create a .xar file which contains both a directory
symlink, and a file with a name property which points into the extracted
symlink directory. By abusing symlink directories in this manner, an
attacker can write arbitrary files to any directory on the filesystem –
providing the user has permissions to write to it.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All xar users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/xar-1.8.0.0.487.100.1"
References
==========
[ 1 ] CVE-2021-30833
https://nvd.nist.gov/vuln/detail/CVE-2021-30833
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202405-19
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-202110-1056 | CVE-2021-30813 | macOS Vulnerability in |
CVSS V2: 2.1 CVSS V3: 6.5 Severity: MEDIUM |
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.0.1. A person with access to a host Mac may be able to bypass the Login Window in Remote Desktop for a locked instance of macOS. macOS Exists in unspecified vulnerabilities.Information may be tampered with.
Information about the security content is also available at
https://support.apple.com/HT212869.
AppKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to elevate privileges
Description: A logic issue was addressed with improved state
management.
CVE-2021-30873: Thijs Alkemade of Computest
AppleScript
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted AppleScript binary may
result in unexpected application termination or disclosure of process
memory
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30876: Jeremy Brown, hjy79425575
CVE-2021-30879: Jeremy Brown, hjy79425575
CVE-2021-30877: Jeremy Brown
CVE-2021-30880: Jeremy Brown
Audio
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to elevate privileges
Description: An integer overflow was addressed through improved input
validation.
CVE-2021-30907: Zweig of Kunlun Lab
Bluetooth
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved state
handling.
CVE-2021-30899: Weiteng Chen, Zheng Zhang, and Zhiyun Qian of UC
Riverside, and Yu Wang of Didi Research America
ColorSync
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: A memory corruption issue existed in the processing of
ICC profiles.
CVE-2021-30917: Alexandru-Vlad Niculae and Mateusz Jurczyk of Google
Project Zero
Continuity Camera
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30903: an anonymous researcher
CoreAudio
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted file may disclose user
information
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30905: Mickey Jin (@patch1t) of Trend Micro
CoreGraphics
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted PDF may lead to arbitrary
code execution
Description: An out-of-bounds write was addressed with improved input
validation.
CVE-2021-30919
FileProvider
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Unpacking a maliciously crafted archive may lead to arbitrary
code execution
Description: An input validation issue was addressed with improved
memory handling.
CVE-2021-30881: Simon Huang (@HuangShaomang) and pjf of IceSword Lab
of Qihoo 360
Game Center
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to access information
about a user's contacts
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30895: Denis Tokarev
Game Center
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to read user's gameplay
data
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30896: Denis Tokarev
iCloud
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to elevate their privileges
Description: This issue was addressed with improved checks.
CVE-2021-30906: Cees Elzinga
Intel Graphics Driver
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
state management.
CVE-2021-30824: Antonio Zekic (@antoniozekic) of Diverto
Intel Graphics Driver
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: Multiple out-of-bounds write issues were addressed with
improved bounds checking.
CVE-2021-30901: Zuozhi Fan (@pattern_F_) of Ant Security TianQiong
Lab, Yinyi Wu (@3ndy1) of Ant Security Light-Year Lab, Jack Dates of
RET2 Systems, Inc.
IOGraphics
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30821: Tim Michaud (@TimGMichaud) of Zoom Video
Communications
IOMobileFrameBuffer
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30883: an anonymous researcher
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A use after free issue was addressed with improved
memory management.
CVE-2021-30886: @0xalsr
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30909: Zweig of Kunlun Lab
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30916: Zweig of Kunlun Lab
LaunchServices
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: A logic issue was addressed with improved state
management.
CVE-2021-30813: Benjamin Berger of BBetterTech LLC, Peter Goedtkindt
of Informatique-MTF S.A., an anonymous researcher
Model I/O
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted file may disclose user
information
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30910: Mickey Jin (@patch1t) of Trend Micro
Model I/O
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted USD file may disclose memory
contents
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30911: Rui Yang and Xingwei Lin of Ant Security Light-Year
Lab
Sandbox
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to read sensitive information
Description: A permissions issue was addressed with improved
validation.
CVE-2021-30920: Csaba Fitzl (@theevilbit) of Offensive Security
SMB
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved locking.
CVE-2021-30868: Peter Nguyen Vu Hoang of STAR Labs
SoftwareUpdate
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may gain access to a user's Keychain
items
Description: The issue was addressed with improved permissions logic.
CVE-2021-30912: Kirin (@Pwnrin) and chenyuwang (@mzzzz__) of Tencent
Security Xuanwu Lab
SoftwareUpdate
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An unprivileged application may be able to edit NVRAM
variables
Description: The issue was addressed with improved permissions logic.
CVE-2021-30913: Kirin (@Pwnrin) and chenyuwang (@mzzzz__) of Tencent
Security Xuanwu Lab
UIKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A person with physical access to an iOS device may be
determine characteristics of a user's password in a secure text entry
field
Description: A logic issue was addressed with improved state
management.
CVE-2021-30915: Kostas Angelopoulos
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An attacker in a privileged network position may be able to
bypass HSTS
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30823: David Gullasch of Recurity Labs
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
unexpectedly unenforced Content Security Policy
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30887: Narendra Bhati (@imnarendrabhati) of Suma Soft Pvt.
Ltd.
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious website using Content Security Policy reports may
be able to leak information via redirect behavior
Description: An information leakage issue was addressed.
CVE-2021-30888: Prakash (@1lastBr3ath)
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A buffer overflow issue was addressed with improved
memory handling.
CVE-2021-30889: Chijin Zhou of ShuiMuYuLin Ltd and Tsinghua
wingtecher lab
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may bypass Gatekeeper checks
Description: A logic issue was addressed with improved state
management.
CVE-2021-30861: Wojciech Reguła (@_r3ggi), Ryan Pickren
(ryanpickren.com)
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
universal cross site scripting
Description: A logic issue was addressed with improved state
management.
CVE-2021-30890: an anonymous researcher
Windows Server
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to view the previous logged in
user’s desktop from the fast user switching screen
Description: An authentication issue was addressed with improved
state management.
CVE-2021-30908: ASentientBot
xar
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Unpacking a maliciously crafted archive may allow an attacker
to write arbitrary files
Description: This issue was addressed with improved checks.
CVE-2021-30833: Richard Warren of NCC Group
zsh
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to modify protected parts
of the file system
Description: An inherited permissions issue was addressed with
additional restrictions.
CVE-2021-30892: Jonathan Bar Or of Microsoft
Additional recognition
APFS
We would like to acknowledge Koh M. Nakagawa of FFRI Security, Inc.
for their assistance.
App Support
We would like to acknowledge an anonymous researcher, 漂亮鼠 of 赛博回忆录
for their assistance.
Bluetooth
We would like to acknowledge say2 of ENKI for their assistance.
CUPS
We would like to acknowledge an anonymous researcher for their
assistance.
iCloud
We would like to acknowledge Ryan Pickren (ryanpickren.com) for their
assistance.
Kernel
We would like to acknowledge Anthony Steinhauser of Google's Safeside
project for their assistance.
Mail
We would like to acknowledge Fabian Ising and Damian Poddebniak of
Münster University of Applied Sciences for their assistance.
Managed Configuration
We would like to acknowledge Michal Moravec of Logicworks, s.r.o. for
their assistance.
smbx
We would like to acknowledge Zhongcheng Li (CK01) for their
assistance.
WebKit
We would like to acknowledge Ivan Fratric of Google Project Zero,
Pavel Gromadchuk, an anonymous researcher for their assistance.
Installation note:
This update may be obtained from the Mac App Store
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=3Pcg
-----END PGP SIGNATURE-----
| VAR-202110-1430 | CVE-2021-30824 | macOS Out-of-bounds write vulnerability in |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges. macOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Apple is aware of a report that this issue may
have been actively exploited. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2021-10-26-3 macOS Monterey 12.0.1
macOS Monterey 12.0.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT212869.
AppKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to elevate privileges
Description: A logic issue was addressed with improved state
management.
CVE-2021-30873: Thijs Alkemade of Computest
AppleScript
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted AppleScript binary may
result in unexpected application termination or disclosure of process
memory
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30876: Jeremy Brown, hjy79425575
CVE-2021-30879: Jeremy Brown, hjy79425575
CVE-2021-30877: Jeremy Brown
CVE-2021-30880: Jeremy Brown
Audio
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to elevate privileges
Description: An integer overflow was addressed through improved input
validation.
CVE-2021-30907: Zweig of Kunlun Lab
Bluetooth
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved state
handling.
CVE-2021-30899: Weiteng Chen, Zheng Zhang, and Zhiyun Qian of UC
Riverside, and Yu Wang of Didi Research America
ColorSync
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: A memory corruption issue existed in the processing of
ICC profiles.
CVE-2021-30917: Alexandru-Vlad Niculae and Mateusz Jurczyk of Google
Project Zero
Continuity Camera
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30903: an anonymous researcher
CoreAudio
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted file may disclose user
information
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30905: Mickey Jin (@patch1t) of Trend Micro
CoreGraphics
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted PDF may lead to arbitrary
code execution
Description: An out-of-bounds write was addressed with improved input
validation.
CVE-2021-30919
FileProvider
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Unpacking a maliciously crafted archive may lead to arbitrary
code execution
Description: An input validation issue was addressed with improved
memory handling.
CVE-2021-30881: Simon Huang (@HuangShaomang) and pjf of IceSword Lab
of Qihoo 360
Game Center
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to access information
about a user's contacts
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30895: Denis Tokarev
Game Center
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to read user's gameplay
data
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30896: Denis Tokarev
iCloud
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to elevate their privileges
Description: This issue was addressed with improved checks.
CVE-2021-30906: Cees Elzinga
Intel Graphics Driver
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
state management.
CVE-2021-30824: Antonio Zekic (@antoniozekic) of Diverto
Intel Graphics Driver
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: Multiple out-of-bounds write issues were addressed with
improved bounds checking.
CVE-2021-30901: Zuozhi Fan (@pattern_F_) of Ant Security TianQiong
Lab, Yinyi Wu (@3ndy1) of Ant Security Light-Year Lab, Jack Dates of
RET2 Systems, Inc.
IOGraphics
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30821: Tim Michaud (@TimGMichaud) of Zoom Video
Communications
IOMobileFrameBuffer
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30883: an anonymous researcher
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A use after free issue was addressed with improved
memory management.
CVE-2021-30886: @0xalsr
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30909: Zweig of Kunlun Lab
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30916: Zweig of Kunlun Lab
LaunchServices
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: A logic issue was addressed with improved state
management.
CVE-2021-30864: Ron Hass (@ronhass7) of Perception Point
Login Window
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A person with access to a host Mac may be able to bypass the
Login Window in Remote Desktop for a locked instance of macOS
Description: This issue was addressed with improved checks.
CVE-2021-30813: Benjamin Berger of BBetterTech LLC, Peter Goedtkindt
of Informatique-MTF S.A., an anonymous researcher
Model I/O
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted file may disclose user
information
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30910: Mickey Jin (@patch1t) of Trend Micro
Model I/O
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted USD file may disclose memory
contents
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30911: Rui Yang and Xingwei Lin of Ant Security Light-Year
Lab
Sandbox
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to read sensitive information
Description: A permissions issue was addressed with improved
validation.
CVE-2021-30920: Csaba Fitzl (@theevilbit) of Offensive Security
SMB
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved locking.
CVE-2021-30868: Peter Nguyen Vu Hoang of STAR Labs
SoftwareUpdate
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may gain access to a user's Keychain
items
Description: The issue was addressed with improved permissions logic.
CVE-2021-30912: Kirin (@Pwnrin) and chenyuwang (@mzzzz__) of Tencent
Security Xuanwu Lab
SoftwareUpdate
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An unprivileged application may be able to edit NVRAM
variables
Description: The issue was addressed with improved permissions logic.
CVE-2021-30913: Kirin (@Pwnrin) and chenyuwang (@mzzzz__) of Tencent
Security Xuanwu Lab
UIKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A person with physical access to an iOS device may be
determine characteristics of a user's password in a secure text entry
field
Description: A logic issue was addressed with improved state
management.
CVE-2021-30915: Kostas Angelopoulos
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An attacker in a privileged network position may be able to
bypass HSTS
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30823: David Gullasch of Recurity Labs
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
unexpectedly unenforced Content Security Policy
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30887: Narendra Bhati (@imnarendrabhati) of Suma Soft Pvt.
Ltd.
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious website using Content Security Policy reports may
be able to leak information via redirect behavior
Description: An information leakage issue was addressed.
CVE-2021-30888: Prakash (@1lastBr3ath)
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A buffer overflow issue was addressed with improved
memory handling.
CVE-2021-30889: Chijin Zhou of ShuiMuYuLin Ltd and Tsinghua
wingtecher lab
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may bypass Gatekeeper checks
Description: A logic issue was addressed with improved state
management.
CVE-2021-30861: Wojciech Reguła (@_r3ggi), Ryan Pickren
(ryanpickren.com)
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
universal cross site scripting
Description: A logic issue was addressed with improved state
management.
CVE-2021-30890: an anonymous researcher
Windows Server
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to view the previous logged in
user’s desktop from the fast user switching screen
Description: An authentication issue was addressed with improved
state management.
CVE-2021-30908: ASentientBot
xar
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Unpacking a maliciously crafted archive may allow an attacker
to write arbitrary files
Description: This issue was addressed with improved checks.
CVE-2021-30833: Richard Warren of NCC Group
zsh
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to modify protected parts
of the file system
Description: An inherited permissions issue was addressed with
additional restrictions.
CVE-2021-30892: Jonathan Bar Or of Microsoft
Additional recognition
APFS
We would like to acknowledge Koh M. Nakagawa of FFRI Security, Inc.
for their assistance.
App Support
We would like to acknowledge an anonymous researcher, 漂亮鼠 of 赛博回忆录
for their assistance.
Bluetooth
We would like to acknowledge say2 of ENKI for their assistance.
CUPS
We would like to acknowledge an anonymous researcher for their
assistance.
iCloud
We would like to acknowledge Ryan Pickren (ryanpickren.com) for their
assistance.
Kernel
We would like to acknowledge Anthony Steinhauser of Google's Safeside
project for their assistance.
Mail
We would like to acknowledge Fabian Ising and Damian Poddebniak of
Münster University of Applied Sciences for their assistance.
Managed Configuration
We would like to acknowledge Michal Moravec of Logicworks, s.r.o. for
their assistance.
smbx
We would like to acknowledge Zhongcheng Li (CK01) for their
assistance.
WebKit
We would like to acknowledge Ivan Fratric of Google Project Zero,
Pavel Gromadchuk, an anonymous researcher for their assistance.
Installation note:
This update may be obtained from the Mac App Store
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=3Pcg
-----END PGP SIGNATURE-----
| VAR-202110-1408 | CVE-2021-30821 | macOS Vulnerability in |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges. macOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Apple is aware of a report that this issue may
have been actively exploited. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2021-10-26-3 macOS Monterey 12.0.1
macOS Monterey 12.0.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT212869.
AppKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to elevate privileges
Description: A logic issue was addressed with improved state
management.
CVE-2021-30873: Thijs Alkemade of Computest
AppleScript
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted AppleScript binary may
result in unexpected application termination or disclosure of process
memory
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30876: Jeremy Brown, hjy79425575
CVE-2021-30879: Jeremy Brown, hjy79425575
CVE-2021-30877: Jeremy Brown
CVE-2021-30880: Jeremy Brown
Audio
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to elevate privileges
Description: An integer overflow was addressed through improved input
validation.
CVE-2021-30907: Zweig of Kunlun Lab
Bluetooth
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved state
handling.
CVE-2021-30899: Weiteng Chen, Zheng Zhang, and Zhiyun Qian of UC
Riverside, and Yu Wang of Didi Research America
ColorSync
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: A memory corruption issue existed in the processing of
ICC profiles.
CVE-2021-30917: Alexandru-Vlad Niculae and Mateusz Jurczyk of Google
Project Zero
Continuity Camera
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30903: an anonymous researcher
CoreAudio
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted file may disclose user
information
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30905: Mickey Jin (@patch1t) of Trend Micro
CoreGraphics
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted PDF may lead to arbitrary
code execution
Description: An out-of-bounds write was addressed with improved input
validation.
CVE-2021-30919
FileProvider
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Unpacking a maliciously crafted archive may lead to arbitrary
code execution
Description: An input validation issue was addressed with improved
memory handling.
CVE-2021-30881: Simon Huang (@HuangShaomang) and pjf of IceSword Lab
of Qihoo 360
Game Center
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to access information
about a user's contacts
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30895: Denis Tokarev
Game Center
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to read user's gameplay
data
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30896: Denis Tokarev
iCloud
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to elevate their privileges
Description: This issue was addressed with improved checks.
CVE-2021-30906: Cees Elzinga
Intel Graphics Driver
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
state management.
CVE-2021-30824: Antonio Zekic (@antoniozekic) of Diverto
Intel Graphics Driver
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: Multiple out-of-bounds write issues were addressed with
improved bounds checking.
CVE-2021-30901: Zuozhi Fan (@pattern_F_) of Ant Security TianQiong
Lab, Yinyi Wu (@3ndy1) of Ant Security Light-Year Lab, Jack Dates of
RET2 Systems, Inc.
IOGraphics
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30821: Tim Michaud (@TimGMichaud) of Zoom Video
Communications
IOMobileFrameBuffer
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30883: an anonymous researcher
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A use after free issue was addressed with improved
memory management.
CVE-2021-30886: @0xalsr
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30909: Zweig of Kunlun Lab
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30916: Zweig of Kunlun Lab
LaunchServices
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: A logic issue was addressed with improved state
management.
CVE-2021-30864: Ron Hass (@ronhass7) of Perception Point
Login Window
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A person with access to a host Mac may be able to bypass the
Login Window in Remote Desktop for a locked instance of macOS
Description: This issue was addressed with improved checks.
CVE-2021-30813: Benjamin Berger of BBetterTech LLC, Peter Goedtkindt
of Informatique-MTF S.A., an anonymous researcher
Model I/O
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted file may disclose user
information
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30910: Mickey Jin (@patch1t) of Trend Micro
Model I/O
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted USD file may disclose memory
contents
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30911: Rui Yang and Xingwei Lin of Ant Security Light-Year
Lab
Sandbox
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to read sensitive information
Description: A permissions issue was addressed with improved
validation.
CVE-2021-30920: Csaba Fitzl (@theevilbit) of Offensive Security
SMB
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved locking.
CVE-2021-30868: Peter Nguyen Vu Hoang of STAR Labs
SoftwareUpdate
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may gain access to a user's Keychain
items
Description: The issue was addressed with improved permissions logic.
CVE-2021-30912: Kirin (@Pwnrin) and chenyuwang (@mzzzz__) of Tencent
Security Xuanwu Lab
SoftwareUpdate
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An unprivileged application may be able to edit NVRAM
variables
Description: The issue was addressed with improved permissions logic.
CVE-2021-30913: Kirin (@Pwnrin) and chenyuwang (@mzzzz__) of Tencent
Security Xuanwu Lab
UIKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A person with physical access to an iOS device may be
determine characteristics of a user's password in a secure text entry
field
Description: A logic issue was addressed with improved state
management.
CVE-2021-30915: Kostas Angelopoulos
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An attacker in a privileged network position may be able to
bypass HSTS
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30823: David Gullasch of Recurity Labs
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
unexpectedly unenforced Content Security Policy
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30887: Narendra Bhati (@imnarendrabhati) of Suma Soft Pvt.
Ltd.
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious website using Content Security Policy reports may
be able to leak information via redirect behavior
Description: An information leakage issue was addressed.
CVE-2021-30888: Prakash (@1lastBr3ath)
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A buffer overflow issue was addressed with improved
memory handling.
CVE-2021-30889: Chijin Zhou of ShuiMuYuLin Ltd and Tsinghua
wingtecher lab
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may bypass Gatekeeper checks
Description: A logic issue was addressed with improved state
management.
CVE-2021-30861: Wojciech Reguła (@_r3ggi), Ryan Pickren
(ryanpickren.com)
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
universal cross site scripting
Description: A logic issue was addressed with improved state
management.
CVE-2021-30890: an anonymous researcher
Windows Server
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to view the previous logged in
user’s desktop from the fast user switching screen
Description: An authentication issue was addressed with improved
state management.
CVE-2021-30908: ASentientBot
xar
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Unpacking a maliciously crafted archive may allow an attacker
to write arbitrary files
Description: This issue was addressed with improved checks.
CVE-2021-30833: Richard Warren of NCC Group
zsh
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to modify protected parts
of the file system
Description: An inherited permissions issue was addressed with
additional restrictions.
CVE-2021-30892: Jonathan Bar Or of Microsoft
Additional recognition
APFS
We would like to acknowledge Koh M. Nakagawa of FFRI Security, Inc.
for their assistance.
App Support
We would like to acknowledge an anonymous researcher, 漂亮鼠 of 赛博回忆录
for their assistance.
Bluetooth
We would like to acknowledge say2 of ENKI for their assistance.
CUPS
We would like to acknowledge an anonymous researcher for their
assistance.
iCloud
We would like to acknowledge Ryan Pickren (ryanpickren.com) for their
assistance.
Kernel
We would like to acknowledge Anthony Steinhauser of Google's Safeside
project for their assistance.
Mail
We would like to acknowledge Fabian Ising and Damian Poddebniak of
Münster University of Applied Sciences for their assistance.
Managed Configuration
We would like to acknowledge Michal Moravec of Logicworks, s.r.o. for
their assistance.
smbx
We would like to acknowledge Zhongcheng Li (CK01) for their
assistance.
WebKit
We would like to acknowledge Ivan Fratric of Google Project Zero,
Pavel Gromadchuk, an anonymous researcher for their assistance.
Installation note:
This update may be obtained from the Mac App Store
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=3Pcg
-----END PGP SIGNATURE-----
| VAR-202110-1428 | CVE-2021-30834 | plural Apple Product vulnerabilities |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A logic issue was addressed with improved state management. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, iOS 15 and iPadOS 15, watchOS 8, Security Update 2021-007 Catalina. Processing a malicious audio file may result in unexpected application termination or arbitrary code execution. plural Apple There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
Alternatively, on your watch, select "My Watch > General > About". -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2021-10-26-9 Additional information for
APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15
iOS 15 and iPadOS 15 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT212814.
Accessory Manager
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory consumption issue was addressed with improved
memory handling.
CVE-2021-30837: Siddharth Aeri (@b1n4r1b01)
AppleMobileFileIntegrity
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A local attacker may be able to read sensitive information
Description: This issue was addressed with improved checks.
CVE-2021-30811: an anonymous researcher working with Compartir
Apple Neural Engine
Available for devices with Apple Neural Engine: iPhone 8 and later,
iPad Pro (3rd generation) and later, iPad Air (3rd generation) and
later, and iPad mini (5th generation)
Impact: A malicious application may be able to execute arbitrary code
with system privileges on devices with an Apple Neural Engine
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30838: proteas wang
bootp
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A device may be passively tracked by its WiFi MAC address
Description: A user privacy issue was addressed by removing the
broadcast MAC address.
CVE-2021-30866: Fabien Duchêne of UCLouvain (Belgium)
Entry added October 25, 2021
CoreAudio
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a malicious audio file may result in unexpected
application termination or arbitrary code execution
Description: A logic issue was addressed with improved state
management.
CVE-2021-30834: JunDong Xie of Ant Security Light-Year Lab
Entry added October 25, 2021
CoreML
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A local attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30825: hjy79425575 working with Trend Micro Zero Day
Initiative
Face ID
Available for devices with Face ID: iPhone X, iPhone XR, iPhone XS
(all models), iPhone 11 (all models), iPhone 12 (all models), iPad
Pro (11-inch), and iPad Pro (3rd generation)
Impact: A 3D model constructed to look like the enrolled user may be
able to authenticate via Face ID
Description: This issue was addressed by improving Face ID anti-
spoofing models.
CVE-2021-30863: Wish Wu (吴潍浠 @wish_wu) of Ant-financial Light-Year
Security Lab
FaceTime
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An attacker with physical access to a device may be able to
see private contact information
Description: The issue was addressed with improved permissions logic.
CVE-2021-30816: Atharv (@atharv0x0)
Entry added October 25, 2021
FaceTime
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An application with microphone permission may unexpectedly
access microphone input during a FaceTime call
Description: A logic issue was addressed with improved validation.
CVE-2021-30882: Adam Bellard and Spencer Reitman of Airtime
Entry added October 25, 2021
FontParser
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted font may result in the
disclosure of process memory
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2021-30831: Xingwei Lin of Ant Security Light-Year Lab
Entry added October 25, 2021
FontParser
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted dfont file may lead to
arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30840: Xingwei Lin of Ant Security Light-Year Lab
Entry added October 25, 2021
FontParser
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted dfont file may lead to
arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30841: Xingwei Lin of Ant Security Light-Year Lab
CVE-2021-30842: Xingwei Lin of Ant Security Light-Year Lab
CVE-2021-30843: Xingwei Lin of Ant Security Light-Year Lab
Foundation
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A type confusion issue was addressed with improved
memory handling.
CVE-2021-30852: Yinyi Wu (@3ndy1) of Ant Security Light-Year Lab
Entry added October 25, 2021
iCloud Photo Library
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A malicious application may be able to access photo metadata
without needing permission to access photos
Description: The issue was addressed with improved authentication.
CVE-2021-30867: Csaba Fitzl (@theevilbit) of Offensive Security
Entry added October 25, 2021
ImageIO
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2021-30814: hjy79425575
Entry added October 25, 2021
ImageIO
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: This issue was addressed with improved checks.
CVE-2021-30835: Ye Zhang of Baidu Security
CVE-2021-30847: Mike Zhang of Pangu Lab
Kernel
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved locking.
CVE-2021-30857: Zweig of Kunlun Lab
libexpat
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A remote attacker may be able to cause a denial of service
Description: This issue was addressed by updating expat to version
2.4.1.
CVE-2013-0340: an anonymous researcher
Model I/O
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted USD file may disclose memory
contents
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2021-30819: Apple
NetworkExtension
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A VPN configuration may be installed by an app without user
permission
Description: An authorization issue was addressed with improved state
management.
CVE-2021-30874: Javier Vieira Boccardo (linkedin.com/javier-vieira-
boccardo)
Entry added October 25, 2021
Preferences
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An application may be able to access restricted files
Description: A validation issue existed in the handling of symlinks.
CVE-2021-30855: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020)
of Tencent Security Xuanwu Lab (xlab.tencent.com)
Preferences
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: A logic issue was addressed with improved state
management.
CVE-2021-30854: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020)
of Tencent Security Xuanwu Lab (xlab.tencent.com)
Quick Look
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Previewing an html file attached to a note may unexpectedly
contact remote servers
Description: A logic issue existed in the handling of document loads.
CVE-2021-30870: Saif Hamed Al Hinai Oman CERT
Entry added October 25, 2021
Sandbox
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A malicious application may be able to modify protected parts
of the file system
Description: This issue was addressed with improved checks.
CVE-2021-30808: Csaba Fitzl (@theevilbit) of Offensive Security
Entry added October 25, 2021
Siri
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A local attacker may be able to view contacts from the lock
screen
Description: A lock screen issue allowed access to contacts on a
locked device.
CVE-2021-30815: an anonymous researcher
Telephony
Available for: iPhone SE (1st generation), iPad Pro 12.9-inch, iPad
Air 2, iPad (5th generation), and iPad mini 4
Impact: In certain situations, the baseband would fail to enable
integrity and ciphering protection
Description: A logic issue was addressed with improved state
management.
CVE-2021-30826: CheolJun Park, Sangwook Bae and BeomSeok Oh of KAIST
SysSec Lab
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Visiting a maliciously crafted website may reveal a user's
browsing history
Description: The issue was resolved with additional restrictions on
CSS compositing.
CVE-2021-30884: an anonymous researcher
Entry added October 25, 2021
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A type confusion issue was addressed with improved state
handling.
CVE-2021-30818: Amar Menezes (@amarekano) of Zon8Research
Entry added October 25, 2021
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted audio file may disclose
restricted memory
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2021-30836: Peter Nguyen Vu Hoang of STAR Labs
Entry added October 25, 2021
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A use after free issue was addressed with improved
memory management.
CVE-2021-30809: an anonymous researcher
Entry added October 25, 2021
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30846: Sergei Glazunov of Google Project Zero
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to code
execution
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30848: Sergei Glazunov of Google Project Zero
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed with
improved memory handling.
CVE-2021-30849: Sergei Glazunov of Google Project Zero
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to code
execution
Description: A memory corruption vulnerability was addressed with
improved locking.
CVE-2021-30851: Samuel Groß of Google Project Zero
Wi-Fi
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An attacker in physical proximity may be able to force a user
onto a malicious Wi-Fi network during device setup
Description: An authorization issue was addressed with improved state
management.
CVE-2021-30810: an anonymous researcher
Additional recognition
Assets
We would like to acknowledge Cees Elzinga for their assistance.
Bluetooth
We would like to acknowledge an anonymous researcher for their
assistance.
File System
We would like to acknowledge Siddharth Aeri (@b1n4r1b01) for their
assistance.
Sandbox
We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive
Security for their assistance.
UIKit
We would like to acknowledge an anonymous researcher for their
assistance.
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About
* The version after applying this update will be "15"
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=lg51
-----END PGP SIGNATURE-----
.
CVE-2021-30901: Zuozhi Fan (@pattern_F_) of Ant Security TianQiong
Lab, Yinyi Wu (@3ndy1), Jack Dates of RET2 Systems, Inc
| VAR-202110-1913 | No CVE | Reporter system of Shanghai Newton Technology Co., Ltd. has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shanghai Newdon Technology Co., Ltd. is a professional security company that takes "network security" as its main axis and "makes the network safer" as its mission to provide customers with overall network security solutions.
The Reporter system of Shanghai Newton Technology Co., Ltd. has a weak password vulnerability. Attackers can use the vulnerability to log in to the system backend to obtain relevant sensitive information.
| VAR-202110-1914 | No CVE | DIR-846 DIR-846 has a command execution vulnerability |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
The DIR-846 router is a wireless router product designed for users who have the needs of e-sports games and film and television entertainment.
DIR-846 DIR-846 has a command execution vulnerability, which can be exploited by attackers to execute arbitrary code.
| VAR-202110-1263 | CVE-2020-28968 | Draytek VigorAP 1000C Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field. Draytek VigorAP 1000C Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
| VAR-202110-1226 | CVE-2020-23054 | User Agent String Switcher Cross-site scripting vulnerability in services |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A cross-site scripting (XSS) vulnerability in NSK User Agent String Switcher Service v0.3.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the user agent input field. The user agent string that web servers and client code see when visiting a website with predetection
| VAR-202111-0278 | CVE-2021-38403 | Delta Electronics DIALink Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter supplier of the API maintenance, which may allow an attacker to remotely execute code. Delta Electronics DIALink Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work. state.
DIALink 1.2.4.0 and earlier versions have a cross-site scripting vulnerability
| VAR-202111-0247 | CVE-2021-38428 | Delta Electronics DIALink Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API schedule, which may allow an attacker to remotely execute code. Delta Electronics DIALink Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work. state.
DIALink 1.2.4.0 and earlier versions have a cross-site scripting vulnerability
| VAR-202111-0276 | CVE-2021-38411 | Delta Electronics DIALink Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter deviceName of the API modbusWriter-Reader, which may allow an attacker to remotely execute code. Delta Electronics DIALink Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work. state.
DIALink 1.2.4.0 and earlier versions have a cross-site scripting vulnerability
| VAR-202111-0251 | CVE-2021-38416 | Delta Electronics DIALink Vulnerability regarding uncontrolled search path elements in |
CVSS V2: 4.4 CVSS V3: 7.8 Severity: HIGH |
Delta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an attacker to use DLL hijacking and takeover the system where the software is installed. Delta Electronics DIALink Exists in a vulnerability in an element of an uncontrolled search path.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work.
DIALink 1.2.4.0 and earlier have security vulnerabilities. The vulnerability stems from an affected product loading a library insecurely
| VAR-202111-0250 | CVE-2021-38418 | Delta Electronics DIALink Vulnerability in plaintext transmission of important information in |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Delta Electronics DIALink versions 1.2.4.0 and prior runs by default on HTTP, which may allow an attacker to be positioned between the traffic and perform a machine-in-the-middle attack to access information without authorization. Delta Electronics DIALink Contains a vulnerability in the transmission of important information in clear text.Information may be obtained. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work. state. An attacker could exploit this vulnerability to gain unauthorized access to information through a machine-in-the-middle attack
| VAR-202111-0249 | CVE-2021-38420 | Delta Electronics DIALink Vulnerability regarding improper default permissions in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions to low-privileged user accounts, which may allow an attacker to modify the installation directory and upload malicious files. Delta Electronics DIALink There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work.
DIALink 1.2.4.0 and earlier versions have an incorrect default permission vulnerability
| VAR-202111-0246 | CVE-2021-38488 | Delta Electronics DIALink Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter comment of the API events, which may allow an attacker to remotely execute code. Delta Electronics DIALink Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work. state.
DIALink 1.2.4.0 and earlier versions have a cross-site scripting vulnerability
| VAR-202111-0248 | CVE-2021-38422 | Delta Electronics DIALink Vulnerability in plaintext storage of important information in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Delta Electronics DIALink versions 1.2.4.0 and prior stores sensitive information in cleartext, which may allow an attacker to have extensive access to the application directory and escalate privileges. Delta Electronics DIALink There is a vulnerability in plaintext storage of important information.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work
| VAR-202111-0277 | CVE-2021-38407 | Delta Electronics DIALink Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API devices, which may allow an attacker to remotely execute code. Delta Electronics DIALink Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work. state.
DIALink 1.2.4.0 and earlier versions have a cross-site scripting vulnerability
| VAR-202111-0346 | CVE-2021-38424 | Delta Electronics DIALink In CSV Vulnerability in neutralizing math elements in files |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
The tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attacker injecting formulas into the tag data. Those formulas may then be executed when it is opened with a spreadsheet application. Delta Electronics DIALink for, CSV A vulnerability exists regarding the neutralization of formula elements in files.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. DIALink is a device networking platform launched by Delta Electronics, which can effectively manage CNC machine tools and PLC control machines, collect field device data and connect with the upper management platform through a unified interface, and provide visual information to reflect process parameters and equipment work.
DIALink 1.2.4.0 and earlier have security vulnerabilities. An attacker can exploit this vulnerability to inject formulas into label data and execute them
| VAR-202110-1355 | CVE-2021-37131 | plural Huawei In the product CSV Vulnerability in neutralizing math elements in files |
CVSS V2: 6.0 CVSS V3: 6.8 Severity: MEDIUM |
There is a CSV injection vulnerability in ManageOne, iManager NetEco and iManager NetEco 6000. An attacker with high privilege may exploit this vulnerability through some operations to inject the CSV files. Due to insufficient input validation of some parameters, the attacker can exploit this vulnerability to inject CSV files to the target device. ManageOne , iManager NetEco , iManager NetEco 6000 for, CSV A vulnerability exists regarding the neutralization of formula elements in files.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state