ID

VAR-202109-0321


CVE

CVE-2021-1858


TITLE

Apple macOS KTX Image DecodeRow Out-Of-Bounds Read Information Disclosure Vulnerability

Trust: 0.7

sources: ZDI: ZDI-21-599

DESCRIPTION

Processing a maliciously crafted image may lead to arbitrary code execution. This issue is fixed in Security Update 2021-002 Catalina, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. An out-of-bounds write issue was addressed with improved bounds checking. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the DecodeRow function. Crafted data in a KTX image can trigger a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Apple macOS is a set of dedicated operating systems developed by Apple Corporation for Mac computers. A buffer error vulnerability exists in macOS due to a boundary error within the ImageIO component. The following products and versions are affected: macOS: 11.0 20A2411, 11.0.1 20B29, 11.0.1 20B50, 11.1 20C69, 11.2 20D64, 11.2.1 20D74, 11.2.1 20D75, 11.2.2 20D80, 11.2.3 2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2021-04-26-5 watchOS 7.4 watchOS 7.4 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212324. AppleMobileFileIntegrity Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to bypass Privacy preferences Description: An issue in code signature validation was addressed with improved checks. CVE-2021-1849: Siguza Audio Available for: Apple Watch Series 3 and later Impact: An application may be able to read restricted memory Description: A memory corruption issue was addressed with improved validation. CVE-2021-1808: JunDong Xie of Ant Security Light-Year Lab CFNetwork Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may disclose sensitive user information Description: A memory initialization issue was addressed with improved memory handling. CVE-2021-1857: an anonymous researcher CoreAudio Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted audio file may disclose restricted memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2021-1846: JunDong Xie of Ant Security Light-Year Lab CoreAudio Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to read restricted memory Description: A memory corruption issue was addressed with improved validation. CVE-2021-1809: JunDong Xie of Ant Security Light-Year Lab CoreFoundation Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to leak sensitive user information Description: A validation issue was addressed with improved logic. CVE-2021-30659: Thijs Alkemade of Computest CoreText Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: A logic issue was addressed with improved state management. CVE-2021-1811: Xingwei Lin of Ant Security Light-Year Lab FaceTime Available for: Apple Watch Series 3 and later Impact: Muting a CallKit call while ringing may not result in mute being enabled Description: A logic issue was addressed with improved state management. CVE-2021-1881: an anonymous researcher, Xingwei Lin of Ant Security Light-Year Lab, Mickey Jin of Trend Micro, and Hou JingYi (@hjy79425575) of Qihoo 360 Foundation Available for: Apple Watch Series 3 and later Impact: An application may be able to gain elevated privileges Description: A memory corruption issue was addressed with improved validation. CVE-2021-1882: Gabe Kirkpatrick (@gabe_k) Foundation Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to gain root privileges Description: A validation issue was addressed with improved logic. CVE-2021-1813: Cees Elzinga Heimdal Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted server messages may lead to heap corruption Description: This issue was addressed with improved checks. CVE-2021-1883: Gabe Kirkpatrick (@gabe_k) Heimdal Available for: Apple Watch Series 3 and later Impact: A remote attacker may be able to cause a denial of service Description: A race condition was addressed with improved locking. CVE-2021-1880: Xingwei Lin of Ant Security Light-Year Lab CVE-2021-30653: Ye Zhang of Baidu Security CVE-2021-1814: Ye Zhang of Baidu Security, Mickey Jin & Qi Sun of Trend Micro, and Xingwei Lin of Ant Security Light-Year Lab CVE-2021-1843: Ye Zhang of Baidu Security ImageIO Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2021-1858: Mickey Jin of Trend Micro iTunes Store Available for: Apple Watch Series 3 and later Impact: An attacker with JavaScript execution may be able to execute arbitrary code Description: A use after free issue was addressed with improved memory management. CVE-2021-1864: CodeColorist of Ant-Financial LightYear Labs Kernel Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to disclose kernel memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2021-1860: @0xalsr Kernel Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-2021-1816: Tielei Wang of Pangu Lab Kernel Available for: Apple Watch Series 3 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A logic issue was addressed with improved state management. CVE-2021-1851: @0xalsr Kernel Available for: Apple Watch Series 3 and later Impact: Copied files may not have the expected file permissions Description: The issue was addressed with improved permissions logic. CVE-2021-1832: an anonymous researcher Kernel Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to disclose kernel memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2021-30660: Alex Plaskett libxpc Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to gain root privileges Description: A race condition was addressed with additional validation. CVE-2021-30652: James Hutchins libxslt Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted file may lead to heap corruption Description: A double free issue was addressed with improved memory management. CVE-2021-1875: Found by OSS-Fuzz MobileInstallation Available for: Apple Watch Series 3 and later Impact: A local user may be able to modify protected parts of the file system Description: A logic issue was addressed with improved restrictions. CVE-2021-1822: Bruno Virlet of The Grizzly Labs Preferences Available for: Apple Watch Series 3 and later Impact: A local user may be able to modify protected parts of the file system Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2021-1815: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com) CVE-2021-1739: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com) CVE-2021-1740: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com) Safari Available for: Apple Watch Series 3 and later Impact: A local user may be able to write arbitrary files Description: A validation issue was addressed with improved input sanitization. CVE-2021-1807: David Schütz (@xdavidhu) Tailspin Available for: Apple Watch Series 3 and later Impact: A local attacker may be able to elevate their privileges Description: A logic issue was addressed with improved state management. CVE-2021-1868: Tim Michaud of Zoom Communications WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to a cross site scripting attack Description: An input validation issue was addressed with improved input validation. CVE-2021-1825: Alex Camboe of Aon’s Cyber Solutions WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2021-1817: an anonymous researcher WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved restrictions. CVE-2021-1826: an anonymous researcher WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may result in the disclosure of process memory Description: A memory initialization issue was addressed with improved memory handling. Apple is aware of a report that this issue may have been actively exploited. CVE-2021-30661: yangkang(@dnpushme) of 360 ATA Additional recognition AirDrop We would like to acknowledge @maxzks for their assistance. CoreAudio We would like to acknowledge an anonymous researcher for their assistance. CoreCrypto We would like to acknowledge Andy Russon of Orange Group for their assistance. File Bookmark We would like to acknowledge an anonymous researcher for their assistance. Foundation We would like to acknowledge CodeColorist of Ant-Financial LightYear Labs for their assistance. Kernel We would like to acknowledge Antonio Frighetto of Politecnico di Milano, GRIMM, Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan, Mikko Kenttälä ( @Turmio_ ) of SensorFu, Proteas, and Tielei Wang of Pangu Lab for their assistance. Security We would like to acknowledge Xingwei Lin of Ant Security Light-Year Lab and john (@nyan_satan) for their assistance. sysdiagnose We would like to acknowledge Tim Michaud (@TimGMichaud) of Leviathan for their assistance. WebKit We would like to acknowledge Emilio Cobos Álvarez of Mozilla for their assistance. Installation note: Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAmCHO2kACgkQZcsbuWJ6 jjCSZA//dGlk6FnYdt225G6hrw0Das2JjehGetTJ/jJWvGKA0/GE5arBiMKOZTke 3Qg9l4+spRDWhTptJNYfahuoPT5L9k9V276JvIQdCgvc/FYcio2XVx0MdSTJY+Q7 ixFOkQio2zQA/WVPAqrC+Y7iY1kmsi4nVa8dnqD2wr9qz2QGV9D7na5ApSmwCqoM AyJgzDIfvtLlMBxV4f5gPBrody/XH+py6YiQyzx/1yZGn9ExkKCKtxHWkMI3ITAB EYH855RpXUemn6wWbJWk/iE6bHRLm/TJIEw8TS3QTWDUXYh3xY55x5jZbGtbhWZw QpAbqEQK74pEfjqEGSlQ+X9z8r+P1pHVDbBwSsptzcUFvm3ClfOdAl4Cyvr78aDk 7/nSnT9ri3BJ3FSBiPL+Kh8ZO2DrkGM2HNYgf792G/M34uKbn+0POnEaADpvhtTo Ot40b3kdUPMWSeEyDy0K/HJm1wlgWKsRgU2X/8xUZQGeR+OlxUv2VIQYC7l6PijW RXCo1cUIp2q74HGg3O8B2sJaLvkk6fR9za8Bp8qcD53O6YXzabqe2SR+oqS0xp/j W2wciUAX4kcZ1YquDjCPs5lBt96Vy75PvGc5BULV4uxmOkH3al2jVKsT4IMdJn2t ITOpVyXUml8UIzJ9jpYALS7SYfz0rCJDMJ7W0SAT1czAF2exrB0= =Nf4q -----END PGP SIGNATURE-----

Trust: 2.34

sources: NVD: CVE-2021-1858 // ZDI: ZDI-21-599 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-376518 // PACKETSTORM: 162370 // PACKETSTORM: 162369

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.15.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.7

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.6

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:14.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.0

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:7.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.1

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.3

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:14.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:14.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.5

Trust: 1.0

vendor:applemodel:macosscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-21-599 // NVD: CVE-2021-1858

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1858
value: HIGH

Trust: 1.0

ZDI: CVE-2021-1858
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202104-1966
value: HIGH

Trust: 0.6

VULHUB: VHN-376518
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-1858
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-376518
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-1858
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2021-1858
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-599 // VULHUB: VHN-376518 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1966 // NVD: CVE-2021-1858

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-376518 // NVD: CVE-2021-1858

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202104-1966

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-376518

PATCH

title:Apple has issued an update to correct this vulnerability.url:https://support.apple.com/HT212325

Trust: 0.7

title:Apple macOS Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=151399

Trust: 0.6

title:Apple: macOS Big Sur 11.3url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=c631c09ebe15d0799205eda727cdfeb3

Trust: 0.1

sources: ZDI: ZDI-21-599 // VULMON: CVE-2021-1858 // CNNVD: CNNVD-202104-1966

EXTERNAL IDS

db:NVDid:CVE-2021-1858

Trust: 2.7

db:ZDIid:ZDI-21-599

Trust: 1.3

db:PACKETSTORMid:162369

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-12775

Trust: 0.7

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:AUSCERTid:ESB-2021.1408.2

Trust: 0.6

db:CS-HELPid:SB2021042704

Trust: 0.6

db:CNNVDid:CNNVD-202104-1966

Trust: 0.6

db:PACKETSTORMid:162370

Trust: 0.2

db:VULHUBid:VHN-376518

Trust: 0.1

db:VULMONid:CVE-2021-1858

Trust: 0.1

sources: ZDI: ZDI-21-599 // VULHUB: VHN-376518 // VULMON: CVE-2021-1858 // PACKETSTORM: 162370 // PACKETSTORM: 162369 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1966 // NVD: CVE-2021-1858

REFERENCES

url:https://support.apple.com/en-us/ht212317

Trust: 1.7

url:https://support.apple.com/en-us/ht212323

Trust: 1.7

url:https://support.apple.com/en-us/ht212324

Trust: 1.7

url:https://support.apple.com/en-us/ht212325

Trust: 1.7

url:https://support.apple.com/en-us/ht212326

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-1858

Trust: 0.8

url:https://support.apple.com/ht212325

Trust: 0.7

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1408.2

Trust: 0.6

url:https://www.zerodayinitiative.com/advisories/zdi-21-599/

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-macos-multiple-vulnerabilities-35171

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021042704

Trust: 0.6

url:https://packetstormsecurity.com/files/162369/apple-security-advisory-2021-04-26-6.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-1860

Trust: 0.2

url:https://support.apple.com/kb/ht201222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1857

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1813

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1864

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1849

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1820

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1739

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1815

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1851

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1809

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1875

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1817

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1846

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1843

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1825

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1811

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1826

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1832

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1816

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1822

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1740

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1808

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1868

Trust: 0.2

url:https://support.apple.com/kb/ht212325

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1814

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1872

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1807

Trust: 0.1

url:https://support.apple.com/ht212324.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1880

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1844

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1882

Trust: 0.1

url:https://support.apple.com/ht212323.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1836

Trust: 0.1

sources: ZDI: ZDI-21-599 // VULHUB: VHN-376518 // VULMON: CVE-2021-1858 // PACKETSTORM: 162370 // PACKETSTORM: 162369 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1966 // NVD: CVE-2021-1858

CREDITS

Apple

Trust: 0.8

sources: PACKETSTORM: 162370 // PACKETSTORM: 162369 // CNNVD: CNNVD-202104-1966

SOURCES

db:ZDIid:ZDI-21-599
db:VULHUBid:VHN-376518
db:VULMONid:CVE-2021-1858
db:PACKETSTORMid:162370
db:PACKETSTORMid:162369
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202104-1966
db:NVDid:CVE-2021-1858

LAST UPDATE DATE

2024-08-14T12:19:51.373000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-599date:2021-05-20T00:00:00
db:VULHUBid:VHN-376518date:2021-09-17T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202104-1966date:2021-09-18T00:00:00
db:NVDid:CVE-2021-1858date:2021-09-17T17:22:54.063

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-599date:2021-05-20T00:00:00
db:VULHUBid:VHN-376518date:2021-09-08T00:00:00
db:PACKETSTORMid:162370date:2021-04-28T15:11:14
db:PACKETSTORMid:162369date:2021-04-28T15:10:17
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202104-1966date:2021-04-27T00:00:00
db:NVDid:CVE-2021-1858date:2021-09-08T15:15:11.507