ID

VAR-202108-1294


CVE

CVE-2021-30979


TITLE

Classic buffer overflow vulnerability in multiple Apple products

Trust: 0.8

sources: JVNDB: JVNDB-2021-021141

DESCRIPTION

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.1, iOS 15.2 and iPadOS 15.2, macOS Big Sur 11.6.2, Security Update 2021-008 Catalina. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. iPadOS , iOS , Apple Mac OS X Classic buffer overflow vulnerabilities exist in multiple Apple products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the ModelIO library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.The specific flaw exists within the ModelIO framework. Crafted data in a ABC file can trigger an overflow of a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process

Trust: 2.43

sources: NVD: CVE-2021-30979 // JVNDB: JVNDB-2021-021141 // ZDI: ZDI-22-358 // VULHUB: VHN-390712 // VULMON: CVE-2021-30979

AFFECTED PRODUCTS

vendor:applemodel:ipadosscope:ltversion:15.2

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.1

Trust: 1.0

vendor:applemodel:macosscope:gteversion:12.0

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.15

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:15.2

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.6.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.7

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15.7

Trust: 1.0

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

vendor:アップルmodel:macosscope:eqversion:12.0 that's all 12.1

Trust: 0.8

vendor:アップルmodel:ipadosscope: - version: -

Trust: 0.8

vendor:アップルmodel:apple mac os xscope: - version: -

Trust: 0.8

vendor:アップルmodel:macosscope:eqversion:11.0 that's all 11.6.2

Trust: 0.8

vendor:applemodel:macosscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-22-358 // JVNDB: JVNDB-2021-021141 // NVD: CVE-2021-30979

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-30979
value: HIGH

Trust: 1.0

NVD: CVE-2021-30979
value: HIGH

Trust: 0.8

ZDI: CVE-2021-30979
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202108-2081
value: HIGH

Trust: 0.6

VULHUB: VHN-390712
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-30979
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-30979
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-390712
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-30979
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-30979
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2021-30979
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-22-358 // VULHUB: VHN-390712 // VULMON: CVE-2021-30979 // JVNDB: JVNDB-2021-021141 // CNNVD: CNNVD-202108-2081 // NVD: CVE-2021-30979

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.1

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-390712 // JVNDB: JVNDB-2021-021141 // NVD: CVE-2021-30979

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202108-2081

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202108-2081

PATCH

title:HT212979 Apple  Security updateurl:https://support.apple.com/en-us/HT212976

Trust: 0.8

title:Apple has issued an update to correct this vulnerability.url:https://support.apple.com/HT212979

Trust: 0.7

title:Apple iOS and iPadOS Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=174578

Trust: 0.6

sources: ZDI: ZDI-22-358 // JVNDB: JVNDB-2021-021141 // CNNVD: CNNVD-202108-2081

EXTERNAL IDS

db:NVDid:CVE-2021-30979

Trust: 4.1

db:ZDIid:ZDI-22-358

Trust: 3.3

db:JVNDBid:JVNDB-2021-021141

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-15171

Trust: 0.7

db:CS-HELPid:SB2021121432

Trust: 0.6

db:AUSCERTid:ESB-2021.4260

Trust: 0.6

db:CNNVDid:CNNVD-202108-2081

Trust: 0.6

db:VULHUBid:VHN-390712

Trust: 0.1

db:VULMONid:CVE-2021-30979

Trust: 0.1

sources: ZDI: ZDI-22-358 // VULHUB: VHN-390712 // VULMON: CVE-2021-30979 // JVNDB: JVNDB-2021-021141 // CNNVD: CNNVD-202108-2081 // NVD: CVE-2021-30979

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-22-358/

Trust: 3.3

url:https://support.apple.com/en-us/ht212976

Trust: 2.4

url:https://support.apple.com/en-us/ht212978

Trust: 1.8

url:https://support.apple.com/en-us/ht212979

Trust: 1.8

url:https://support.apple.com/en-us/ht212981

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-30979

Trust: 0.8

url:https://support.apple.com/ht212979

Trust: 0.7

url:https://www.cybersecurity-help.cz/vdb/sb2021121432

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4260

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-macos-multiple-vulnerabilities-37064

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/120.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-22-358 // VULHUB: VHN-390712 // VULMON: CVE-2021-30979 // JVNDB: JVNDB-2021-021141 // CNNVD: CNNVD-202108-2081 // NVD: CVE-2021-30979

CREDITS

Mickey Jin (@patch1t) of Trend Micro

Trust: 1.3

sources: ZDI: ZDI-22-358 // CNNVD: CNNVD-202108-2081

SOURCES

db:ZDIid:ZDI-22-358
db:VULHUBid:VHN-390712
db:VULMONid:CVE-2021-30979
db:JVNDBid:JVNDB-2021-021141
db:CNNVDid:CNNVD-202108-2081
db:NVDid:CVE-2021-30979

LAST UPDATE DATE

2024-08-14T13:18:48.005000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-358date:2022-02-16T00:00:00
db:VULHUBid:VHN-390712date:2022-02-22T00:00:00
db:VULMONid:CVE-2021-30979date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2021-021141date:2024-07-18T01:45:00
db:CNNVDid:CNNVD-202108-2081date:2022-03-10T00:00:00
db:NVDid:CVE-2021-30979date:2023-11-07T03:34:10.540

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-358date:2022-02-16T00:00:00
db:VULHUBid:VHN-390712date:2021-08-24T00:00:00
db:VULMONid:CVE-2021-30979date:2021-08-24T00:00:00
db:JVNDBid:JVNDB-2021-021141date:2024-07-18T00:00:00
db:CNNVDid:CNNVD-202108-2081date:2021-08-24T00:00:00
db:NVDid:CVE-2021-30979date:2021-08-24T19:15:23.340