ID

VAR-202109-0366


CVE

CVE-2021-1857


TITLE

Pillow Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

DESCRIPTION

A memory initialization issue was addressed with improved memory handling. This issue is fixed in iTunes 12.11.3 for Windows, Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iCloud for Windows 12.3, macOS Big Sur 11.3, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may disclose sensitive user information. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Apple iTunes is a set of media player applications of Apple (Apple), which is mainly used for playing and managing digital music and video files. This was addressed with additional ownership checks. CVE-2021-1805: ABC Research s.r.o. CVE-2021-1806: ABC Research s.r.o. CVE-2021-1834: ABC Research s.r.o. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2021-04-26-5 watchOS 7.4 watchOS 7.4 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212324. AppleMobileFileIntegrity Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to bypass Privacy preferences Description: An issue in code signature validation was addressed with improved checks. CVE-2021-1849: Siguza Audio Available for: Apple Watch Series 3 and later Impact: An application may be able to read restricted memory Description: A memory corruption issue was addressed with improved validation. CVE-2021-1857: an anonymous researcher CoreAudio Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted audio file may disclose restricted memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2021-1846: JunDong Xie of Ant Security Light-Year Lab CoreAudio Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to read restricted memory Description: A memory corruption issue was addressed with improved validation. CVE-2021-1809: JunDong Xie of Ant Security Light-Year Lab CoreFoundation Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to leak sensitive user information Description: A validation issue was addressed with improved logic. CVE-2021-30659: Thijs Alkemade of Computest CoreText Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: A logic issue was addressed with improved state management. CVE-2021-1811: Xingwei Lin of Ant Security Light-Year Lab FaceTime Available for: Apple Watch Series 3 and later Impact: Muting a CallKit call while ringing may not result in mute being enabled Description: A logic issue was addressed with improved state management. CVE-2021-1872: Siraj Zaneer of Facebook FontParser Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2021-1881: an anonymous researcher, Xingwei Lin of Ant Security Light-Year Lab, Mickey Jin of Trend Micro, and Hou JingYi (@hjy79425575) of Qihoo 360 Foundation Available for: Apple Watch Series 3 and later Impact: An application may be able to gain elevated privileges Description: A memory corruption issue was addressed with improved validation. CVE-2021-1882: Gabe Kirkpatrick (@gabe_k) Foundation Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to gain root privileges Description: A validation issue was addressed with improved logic. CVE-2021-1813: Cees Elzinga Heimdal Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted server messages may lead to heap corruption Description: This issue was addressed with improved checks. CVE-2021-1883: Gabe Kirkpatrick (@gabe_k) Heimdal Available for: Apple Watch Series 3 and later Impact: A remote attacker may be able to cause a denial of service Description: A race condition was addressed with improved locking. CVE-2021-1884: Gabe Kirkpatrick (@gabe_k) ImageIO Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: This issue was addressed with improved checks. CVE-2021-1880: Xingwei Lin of Ant Security Light-Year Lab CVE-2021-30653: Ye Zhang of Baidu Security CVE-2021-1814: Ye Zhang of Baidu Security, Mickey Jin & Qi Sun of Trend Micro, and Xingwei Lin of Ant Security Light-Year Lab CVE-2021-1843: Ye Zhang of Baidu Security ImageIO Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2021-1885: CFF of Topsec Alpha Team ImageIO Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2021-1858: Mickey Jin of Trend Micro iTunes Store Available for: Apple Watch Series 3 and later Impact: An attacker with JavaScript execution may be able to execute arbitrary code Description: A use after free issue was addressed with improved memory management. CVE-2021-1860: @0xalsr Kernel Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-2021-1816: Tielei Wang of Pangu Lab Kernel Available for: Apple Watch Series 3 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A logic issue was addressed with improved state management. CVE-2021-1851: @0xalsr Kernel Available for: Apple Watch Series 3 and later Impact: Copied files may not have the expected file permissions Description: The issue was addressed with improved permissions logic. CVE-2021-1832: an anonymous researcher Kernel Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to disclose kernel memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2021-30660: Alex Plaskett libxpc Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to gain root privileges Description: A race condition was addressed with additional validation. CVE-2021-30652: James Hutchins libxslt Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted file may lead to heap corruption Description: A double free issue was addressed with improved memory management. CVE-2021-1875: Found by OSS-Fuzz MobileInstallation Available for: Apple Watch Series 3 and later Impact: A local user may be able to modify protected parts of the file system Description: A logic issue was addressed with improved restrictions. CVE-2021-1822: Bruno Virlet of The Grizzly Labs Preferences Available for: Apple Watch Series 3 and later Impact: A local user may be able to modify protected parts of the file system Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2021-1815: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com) CVE-2021-1739: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com) CVE-2021-1740: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com) Safari Available for: Apple Watch Series 3 and later Impact: A local user may be able to write arbitrary files Description: A validation issue was addressed with improved input sanitization. CVE-2021-1807: David Schütz (@xdavidhu) Tailspin Available for: Apple Watch Series 3 and later Impact: A local attacker may be able to elevate their privileges Description: A logic issue was addressed with improved state management. CVE-2021-1868: Tim Michaud of Zoom Communications WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to a cross site scripting attack Description: An input validation issue was addressed with improved input validation. CVE-2021-1825: Alex Camboe of Aon’s Cyber Solutions WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2021-1817: an anonymous researcher WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved restrictions. CVE-2021-1820: an anonymous researcher WebKit Storage Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. CVE-2021-30661: yangkang(@dnpushme) of 360 ATA Additional recognition AirDrop We would like to acknowledge @maxzks for their assistance. CoreAudio We would like to acknowledge an anonymous researcher for their assistance. CoreCrypto We would like to acknowledge Andy Russon of Orange Group for their assistance. File Bookmark We would like to acknowledge an anonymous researcher for their assistance. Foundation We would like to acknowledge CodeColorist of Ant-Financial LightYear Labs for their assistance. Kernel We would like to acknowledge Antonio Frighetto of Politecnico di Milano, GRIMM, Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan, Mikko Kenttälä ( @Turmio_ ) of SensorFu, Proteas, and Tielei Wang of Pangu Lab for their assistance. Security We would like to acknowledge Xingwei Lin of Ant Security Light-Year Lab and john (@nyan_satan) for their assistance. sysdiagnose We would like to acknowledge Tim Michaud (@TimGMichaud) of Leviathan for their assistance. WebKit We would like to acknowledge Emilio Cobos Álvarez of Mozilla for their assistance. Installation note: Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAmCHO2kACgkQZcsbuWJ6 jjCSZA//dGlk6FnYdt225G6hrw0Das2JjehGetTJ/jJWvGKA0/GE5arBiMKOZTke 3Qg9l4+spRDWhTptJNYfahuoPT5L9k9V276JvIQdCgvc/FYcio2XVx0MdSTJY+Q7 ixFOkQio2zQA/WVPAqrC+Y7iY1kmsi4nVa8dnqD2wr9qz2QGV9D7na5ApSmwCqoM AyJgzDIfvtLlMBxV4f5gPBrody/XH+py6YiQyzx/1yZGn9ExkKCKtxHWkMI3ITAB EYH855RpXUemn6wWbJWk/iE6bHRLm/TJIEw8TS3QTWDUXYh3xY55x5jZbGtbhWZw QpAbqEQK74pEfjqEGSlQ+X9z8r+P1pHVDbBwSsptzcUFvm3ClfOdAl4Cyvr78aDk 7/nSnT9ri3BJ3FSBiPL+Kh8ZO2DrkGM2HNYgf792G/M34uKbn+0POnEaADpvhtTo Ot40b3kdUPMWSeEyDy0K/HJm1wlgWKsRgU2X/8xUZQGeR+OlxUv2VIQYC7l6PijW RXCo1cUIp2q74HGg3O8B2sJaLvkk6fR9za8Bp8qcD53O6YXzabqe2SR+oqS0xp/j W2wciUAX4kcZ1YquDjCPs5lBt96Vy75PvGc5BULV4uxmOkH3al2jVKsT4IMdJn2t ITOpVyXUml8UIzJ9jpYALS7SYfz0rCJDMJ7W0SAT1czAF2exrB0= =Nf4q -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2021-1857 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-376517 // PACKETSTORM: 162360 // PACKETSTORM: 162362 // PACKETSTORM: 162372 // PACKETSTORM: 162370 // PACKETSTORM: 162369 // PACKETSTORM: 162373

AFFECTED PRODUCTS

vendor:applemodel:icloudscope:ltversion:12.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.3

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:12.11.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.7

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.6

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:14.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.0

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:7.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.1

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.3

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:14.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.3

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:14.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.5

Trust: 1.0

sources: NVD: CVE-2021-1857

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1857
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202104-1918
value: MEDIUM

Trust: 0.6

VULHUB: VHN-376517
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-1857
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-376517
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-1857
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-376517 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1918 // NVD: CVE-2021-1857

PROBLEMTYPE DATA

problemtype:CWE-665

Trust: 1.1

sources: VULHUB: VHN-376517 // NVD: CVE-2021-1857

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202104-1918

TYPE

other

Trust: 1.2

sources: CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1918

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-376517

PATCH

title:Apple iTunes Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=148595

Trust: 0.6

title:Apple: iTunes 12.11.3 for Windowsurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=9e02e28577d8d4832fc60a2cd2125bd3

Trust: 0.1

title:Apple: macOS Big Sur 11.3url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=c631c09ebe15d0799205eda727cdfeb3

Trust: 0.1

sources: VULMON: CVE-2021-1857 // CNNVD: CNNVD-202104-1918

EXTERNAL IDS

db:NVDid:CVE-2021-1857

Trust: 2.4

db:PACKETSTORMid:162360

Trust: 0.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021042803

Trust: 0.6

db:AUSCERTid:ESB-2021.1408.2

Trust: 0.6

db:CNNVDid:CNNVD-202104-1918

Trust: 0.6

db:PACKETSTORMid:162370

Trust: 0.2

db:PACKETSTORMid:162372

Trust: 0.2

db:PACKETSTORMid:162362

Trust: 0.2

db:PACKETSTORMid:162373

Trust: 0.2

db:PACKETSTORMid:162369

Trust: 0.2

db:VULHUBid:VHN-376517

Trust: 0.1

db:VULMONid:CVE-2021-1857

Trust: 0.1

sources: VULHUB: VHN-376517 // VULMON: CVE-2021-1857 // PACKETSTORM: 162360 // PACKETSTORM: 162362 // PACKETSTORM: 162372 // PACKETSTORM: 162370 // PACKETSTORM: 162369 // PACKETSTORM: 162373 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1918 // NVD: CVE-2021-1857

REFERENCES

url:https://support.apple.com/en-us/ht212321

Trust: 2.3

url:https://support.apple.com/en-us/ht212317

Trust: 1.7

url:https://support.apple.com/en-us/ht212319

Trust: 1.7

url:https://support.apple.com/en-us/ht212323

Trust: 1.7

url:https://support.apple.com/en-us/ht212324

Trust: 1.7

url:https://support.apple.com/en-us/ht212325

Trust: 1.7

url:https://support.apple.com/en-us/ht212326

Trust: 1.7

url:https://support.apple.com/en-us/ht212327

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-1857

Trust: 1.2

url:https://support.apple.com/kb/ht201222

Trust: 0.6

url:https://www.apple.com/support/security/pgp/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-1811

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://packetstormsecurity.com/files/162360/apple-security-advisory-2021-04-26-3.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1408.2

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-macos-multiple-vulnerabilities-35171

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021042803

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-1860

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1813

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1739

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1851

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1809

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1875

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1843

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1808

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1868

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1825

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1740

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-1840

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1876

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1828

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8037

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1784

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1847

Trust: 0.2

url:https://support.apple.com/downloads/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-27942

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1839

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-3838

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1797

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8285

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1834

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1873

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8286

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-7463

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1864

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1849

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1820

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1815

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1858

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1817

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1846

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1826

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1832

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1816

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-1822

Trust: 0.2

url:https://support.apple.com/kb/ht212319

Trust: 0.1

url:https://support.apple.com/ht212326.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1810

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1878

Trust: 0.1

url:https://support.apple.com/ht212327.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1805

Trust: 0.1

url:https://support.apple.com/ht212321.

Trust: 0.1

url:https://support.apple.com/en-us/ht201391

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1814

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1872

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1807

Trust: 0.1

url:https://support.apple.com/ht212324.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1880

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1844

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1882

Trust: 0.1

url:https://support.apple.com/ht212323.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1836

Trust: 0.1

url:https://support.apple.com/ht212319.

Trust: 0.1

url:https://www.apple.com/itunes/download

Trust: 0.1

sources: VULHUB: VHN-376517 // VULMON: CVE-2021-1857 // PACKETSTORM: 162360 // PACKETSTORM: 162362 // PACKETSTORM: 162372 // PACKETSTORM: 162370 // PACKETSTORM: 162369 // PACKETSTORM: 162373 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1918 // NVD: CVE-2021-1857

CREDITS

Apple

Trust: 1.2

sources: PACKETSTORM: 162360 // PACKETSTORM: 162362 // PACKETSTORM: 162372 // PACKETSTORM: 162370 // PACKETSTORM: 162369 // PACKETSTORM: 162373 // CNNVD: CNNVD-202104-1918

SOURCES

db:VULHUBid:VHN-376517
db:VULMONid:CVE-2021-1857
db:PACKETSTORMid:162360
db:PACKETSTORMid:162362
db:PACKETSTORMid:162372
db:PACKETSTORMid:162370
db:PACKETSTORMid:162369
db:PACKETSTORMid:162373
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202104-1918
db:NVDid:CVE-2021-1857

LAST UPDATE DATE

2024-08-14T12:39:53.610000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-376517date:2021-09-16T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202104-1918date:2021-09-17T00:00:00
db:NVDid:CVE-2021-1857date:2021-09-16T18:09:31.877

SOURCES RELEASE DATE

db:VULHUBid:VHN-376517date:2021-09-08T00:00:00
db:PACKETSTORMid:162360date:2021-04-28T14:58:36
db:PACKETSTORMid:162362date:2021-04-28T15:00:23
db:PACKETSTORMid:162372date:2021-04-28T15:13:56
db:PACKETSTORMid:162370date:2021-04-28T15:11:14
db:PACKETSTORMid:162369date:2021-04-28T15:10:17
db:PACKETSTORMid:162373date:2021-04-28T15:14:17
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202104-1918date:2021-04-26T00:00:00
db:NVDid:CVE-2021-1857date:2021-09-08T15:15:11.453