ID

VAR-202109-1354


CVE

CVE-2021-30741


TITLE

Pillow Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

DESCRIPTION

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.6 and iPadOS 14.6. Processing a maliciously crafted mail message may lead to unexpected memory modification or application termination. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Apple iPadOS is an operating system for iPad tablet computers developed by Apple. A resource management error vulnerability exists in Apple iPadOS. The vulnerability stems from a use-after-free in the Mail component when processing email messages. A remote attacker could exploit this vulnerability to execute arbitrary code. The following products and versions are affected: iPados: 14.0 18A373, 14.0.1 18A393, 14.1 18A8395, 14.2 18b92, 14.2 18b111, 14.3 18C66, 14.4 18d52, 14.4.1 18d61, 14.4.2 18D70, 14E199, 14.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5.5

Trust: 1.62

sources: NVD: CVE-2021-30741 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-390474 // VULMON: CVE-2021-30741

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:ltversion:14.6

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:14.6

Trust: 1.0

sources: NVD: CVE-2021-30741

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-30741
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202105-1522
value: HIGH

Trust: 0.6

VULHUB: VHN-390474
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-30741
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-30741
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-390474
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-30741
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.2
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-390474 // VULMON: CVE-2021-30741 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-1522 // NVD: CVE-2021-30741

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

sources: VULHUB: VHN-390474 // NVD: CVE-2021-30741

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202105-1522

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:Apple iPadOS Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=151707

Trust: 0.6

title:Apple: iOS 14.6 and iPadOS 14.6url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=aebc753d2fbbe6784a52339b16fd5417

Trust: 0.1

sources: VULMON: CVE-2021-30741 // CNNVD: CNNVD-202105-1522

EXTERNAL IDS

db:NVDid:CVE-2021-30741

Trust: 1.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:AUSCERTid:ESB-2021.1797

Trust: 0.6

db:CS-HELPid:SB2021052505

Trust: 0.6

db:CNNVDid:CNNVD-202105-1522

Trust: 0.6

db:CNVDid:CNVD-2022-55060

Trust: 0.1

db:VULHUBid:VHN-390474

Trust: 0.1

db:VULMONid:CVE-2021-30741

Trust: 0.1

sources: VULHUB: VHN-390474 // VULMON: CVE-2021-30741 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-1522 // NVD: CVE-2021-30741

REFERENCES

url:https://support.apple.com/en-us/ht212528

Trust: 1.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-ios-multiple-vulnerabilities-35513

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-30741

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021052505

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1797

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://support.apple.com/kb/ht212528

Trust: 0.1

sources: VULHUB: VHN-390474 // VULMON: CVE-2021-30741 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-1522 // NVD: CVE-2021-30741

SOURCES

db:VULHUBid:VHN-390474
db:VULMONid:CVE-2021-30741
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202105-1522
db:NVDid:CVE-2021-30741

LAST UPDATE DATE

2024-08-14T12:48:49.054000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-390474date:2023-01-09T00:00:00
db:VULMONid:CVE-2021-30741date:2021-09-14T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202105-1522date:2021-09-15T00:00:00
db:NVDid:CVE-2021-30741date:2023-01-09T16:41:59.350

SOURCES RELEASE DATE

db:VULHUBid:VHN-390474date:2021-09-08T00:00:00
db:VULMONid:CVE-2021-30741date:2021-09-08T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202105-1522date:2021-05-25T00:00:00
db:NVDid:CVE-2021-30741date:2021-09-08T14:15:09.513