Vulnerabilities > CVE-2021-30858 - Use After Free vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Related news
- Apple products vulnerable to FORCEDENTRY zero-day attack – patch now! (source)
- A new zero-day is being exploited to compromise Macs (CVE-2021-30869) (source)
- Apple Patches 3 More Zero-Days Under Active Attack (source)
- Apple Releases Urgent iPhone and iPad Updates to Patch New Zero-Day Vulnerability (source)
References
- https://support.apple.com/en-us/HT212804
- https://support.apple.com/en-us/HT212807
- http://seclists.org/fulldisclosure/2021/Sep/27
- http://seclists.org/fulldisclosure/2021/Sep/25
- http://seclists.org/fulldisclosure/2021/Sep/29
- http://www.openwall.com/lists/oss-security/2021/09/20/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
- http://seclists.org/fulldisclosure/2021/Sep/38
- http://seclists.org/fulldisclosure/2021/Sep/39
- https://www.debian.org/security/2021/dsa-4975
- https://www.debian.org/security/2021/dsa-4976
- https://support.apple.com/kb/HT212824
- http://seclists.org/fulldisclosure/2021/Sep/50
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/
- http://www.openwall.com/lists/oss-security/2021/10/26/9
- http://www.openwall.com/lists/oss-security/2021/10/27/1
- http://www.openwall.com/lists/oss-security/2021/10/27/2
- http://www.openwall.com/lists/oss-security/2021/10/27/4