12/30/2023 0 Comments Apple security breach 2021![]() Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Impact: A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release.ĭescription: A deserialization issue was addressed through improved validation.ĬVE-2021-31010: Citizen Lab and Google Project Zero Apple is aware of a report that this issue may have been actively exploited.ĭescription: An integer overflow was addressed with improved input validation.Īvailable for: iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation) Impact: Processing a maliciously crafted PDF may lead to arbitrary code execution. Impact: A malicious application may be able to bypass Privacy preferencesĭescription: A permissions issue was addressed with improved validation.Available for: iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation) ![]() Impact: A remote attacker may be able to leak memoryĭescription: A logic issue was addressed with improved state management.ĬVE-2021-30844: Peter Nguyen Vu Hoang of STAR Labs Impact: A user may gain access to protected parts of the file system This issue was addressed with improved validation of symlinks.ĬVE-2021-30855: Zhipeng Huo and Yuebin Sun of Tencent Security Xuanwu Lab () Impact: An application may be able to access restricted filesĭescription: A validation issue existed in the handling of symlinks. Impact: A remote attacker may be able to cause a denial of serviceĭescription: This issue was addressed by updating expat to version 2.4.1. Impact: Mounting a maliciously crafted NFS network share may lead to arbitrary code execution with system privilegesĭescription: A race condition was addressed with additional validation.ĬVE-2020-29622: Jordy Zomer of Certified Secureĭescription: A race condition was addressed with improved locking.ĬVE-2021-30857: Manish Bhatt of Red Team X Zweig of Kunlun Labĭescription: A type confusion issue was addressed with improved state handling. ![]() Impact: A malicious application may be able to execute arbitrary code with kernel privilegesĭescription: A memory corruption issue was addressed with improved memory handling.ĭescription: An out-of-bounds read was addressed with improved input validation. Impact: Processing a maliciously crafted image may lead to arbitrary code executionĬVE-2021-30835: Ye Zhang of Baidu Security ![]() Impact: Processing a maliciously crafted dfont file may lead to arbitrary code executionĬVE-2021-30841: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-30842: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-30843: Xingwei Lin of Ant Security Light-Year Lab Impact: curl could potentially reveal sensitive internal information to the server using a clear-text network protocolĭescription: A buffer overflow was addressed with improved input validation.ĭescription: A memory corruption issue was addressed with improved state management.ĬVE-2021-30832: Mickey Jin of Trend Micro Impact: A local user may be able to execute arbitrary filesĭescription: A URI parsing issue was addressed with improved parsing.ĬVE-2021-30829: Nathan Nye of WhiteBeam Security, Inc. Impact: A local user may be able to read arbitrary files as rootĭescription: This issue was addressed with improved checks.ĬVE-2021-30828: Nathan Nye of WhiteBeam Security, Inc. This issue was addressed with improved permission validation.ĬVE-2021-30827: Nathan Nye of WhiteBeam Security, Inc.Įntry added September 20, 2021, updated May 25, 2022 ![]() Impact: A local attacker may be able to elevate their privilegesĭescription: A permissions issue existed. Impact: A sandboxed process may be able to circumvent sandbox restrictionsĭescription: An access issue was addressed with improved access restrictions.ĬVE-2021-30783: an anonymous researcher, Ron Hass of Perception Point Apple is aware of a report that this issue may have been actively exploited.ĭescription: An integer overflow was addressed with improved input validation. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |