Rewterz
Rewterz Threat Advisory – CVE-2021-31198 – Microsoft Exchange Server Remote Code Execution Vulnerability
July 22, 2021
Rewterz
Rewterz Threat Alert – AZORult Active-IOCs
July 23, 2021

Rewterz Threat Advisory – Multiple Apple macOS Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2021-30742

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the GetFramesPerPacket function in AudioToolboxCore. Crafted data in a LOAS file can trigger a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.

CVE-2021-30662

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ImageIO framework. Crafted data in a TIFF image can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

CVE-2021-30706

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the ImageIO library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the ImageIO framework. Crafted data in a WEBP file can trigger a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.

CVE-2021-30764

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the ImageIO library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the ImageIO framework. Crafted data in a WEBP file can trigger a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.

Impact

  • Code Execution
  • Information disclosure

Affected Vendors

Apple

Affected Products

  • macOS

Remediation

Apple has issued an update to correct this vulnerability. More details can be found at

https://support.apple.com