CVE-2021-30860

Scores

EPSS

0.706medium70.6%
0%20%40%60%80%100%

Percentile: 70.6%

CVSS

7.8high3.x
0246810

CVSS Score: 7.8/10

All CVSS Scores

CVSS 3.x
7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvdredhat

CWEs

CWE-190

Related Vulnerabilities

Exploits

Exploit ID: CVE-2021-30860

Source: github-poc

URL: https://github.com/jeffssh/CVE-2021-30860

Vulnerable Software (18)

Type: Configuration

Product: libpoppler-cpp-devel

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Product: libpoppler-devel

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Product: libpoppler-gir

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Product: libpoppler-gir-devel

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Product: libpoppler-glib-devel

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Product: libpoppler-qt5-devel

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Product: libpoppler0-cpp

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Product: libpoppler1-qt5

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Product: libpoppler115

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Product: libpoppler8-glib

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Product: poppler

Operating System: altlinux

Trait:
{  "fixed": "0:21.11.0-alt1.p10.1"}

Source: redhat

Type: Configuration

Vendor: *

Product: ipados

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",      "versionEndExcluding": "14.8",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:iphon...

Source: nvd

Type: Configuration

Vendor: *

Product: iphone_os

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",      "versionEndExcluding": "14.8",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:iphon...

Source: nvd

Type: Configuration

Vendor: *

Product: mac_os_x

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",      "versionEndExcluding": "14.8",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:iphon...

Source: nvd

Type: Configuration

Vendor: *

Product: macos

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",      "versionEndExcluding": "14.8",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:iphon...

Source: nvd

Type: Configuration

Vendor: *

Product: poppler

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",      "versionEndExcluding": "22.09.0",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: watchos

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",      "versionEndExcluding": "14.8",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:iphon...

Source: nvd

Type: Configuration

Vendor: *

Product: xpdf

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*",      "versionEndExcluding": "4.04",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list