CVE-2021-30789 – Apple macOS CoreText TTF File Parsing Integer Overflow Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2021-30789
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Processing a maliciously crafted font file may lead to arbitrary code execution. Se abordó una lectura fuera de límites con una comprobación de entrada mejorada. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, watchOS versión 7.6, tvOS versión 14.7, Security Update 2021-004 Catalina. • https://support.apple.com/en-us/HT212600 https://support.apple.com/en-us/HT212601 https://support.apple.com/en-us/HT212602 https://support.apple.com/en-us/HT212604 https://support.apple.com/en-us/HT212605 • CWE-125: Out-of-bounds Read •
CVE-2021-30748
https://notcve.org/view.php?id=CVE-2021-30748
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. An application may be able to execute arbitrary code with kernel privileges. Se abordó un problema de corrupción de la memoria con una administración de estado mejorada. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5. • https://support.apple.com/en-us/HT212601 https://support.apple.com/en-us/HT212602 https://support.apple.com/kb/HT212604 • CWE-787: Out-of-bounds Write •
CVE-2021-30781
https://notcve.org/view.php?id=CVE-2021-30781
This issue was addressed with improved checks. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. A local attacker may be able to cause unexpected application termination or arbitrary code execution. Este problema se corrigió con comprobaciones mejoradas. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, watchOS versión 7.6, tvOS versión 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. • https://support.apple.com/en-us/HT212600 https://support.apple.com/en-us/HT212601 https://support.apple.com/en-us/HT212602 https://support.apple.com/en-us/HT212603 https://support.apple.com/en-us/HT212604 https://support.apple.com/en-us/HT212605 •
CVE-2021-30774
https://notcve.org/view.php?id=CVE-2021-30774
A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. A malicious application may be able to gain root privileges. Se abordó un problema lógico con una comprobación mejorada. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, watchOS versión 7.6, tvOS versión 14.7. • https://support.apple.com/en-us/HT212601 https://support.apple.com/en-us/HT212602 https://support.apple.com/en-us/HT212604 https://support.apple.com/en-us/HT212605 https://support.apple.com/kb/HT212600 •
CVE-2021-30785 – Apple macOS ImageIO PICT File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-30785
A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Processing a maliciously crafted image may lead to arbitrary code execution. Se abordó un desbordamiento de búfer con una comprobación de límites mejorada. Este problema se corrigió en iOS versión 14.7, macOS Big Sur versión 11.5, watchOS versión 7.6, tvOS versión 14.7, Security Update 2021-004 Catalina. • https://support.apple.com/en-us/HT212600 https://support.apple.com/en-us/HT212601 https://support.apple.com/en-us/HT212602 https://support.apple.com/en-us/HT212604 https://support.apple.com/en-us/HT212605 https://www.zerodayinitiative.com/advisories/ZDI-22-353 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •