Apple Zero-Day Vulnerabilities

Risk:
high
Damage:
high
Platform(s):
MAC OSX Apple iOS
Advisory ID:
ngCERT-2021-0039
Version:
N/A
CVE:
CVE-2021-30665, CVE-2021-30663
Published:
May 18, 2021

Summary


Apple has reported a zero-day vulnerability affecting its iOS, macOS and watchOS operating system being exploited by attackers in the wild to craft malicious web content, which may lead to remote code execution. Apple has therefore, released security patches for the zero-day bugs under active attacks.

Description & Consequence


The zero-day vulnerability tracked with CVE-2021-30665 and CVE-2021-30663 as Buffer overflow and Integer Overflow vulnerabilities. Buffer overflows occur when a developer does not sanitize or validate the user input before allocating space for it in the buffer. Integer overflow leads to the execution of buffer overflow vulnerability which allows the attacker to gain shell and elevate his privileges once this vulnerability is exploited. The validation checks are actually disabled by the integer overflow vulnerability thus resulting in execution of buffer overflow. The vulnerabilities allows a remote attacker to execute arbitrary code on the target system.

Successful exploitation of this vulnerabilities may result in complete compromise of vulnerable system which allows a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Solution


Users of Apple devices are recommended to update to the latest versions to mitigate the risk associated with the flaws from their website.

Reference


  1. https://thehackernews.com/2021/05/apple-releases-urgent-security-patches.html
  2. https://vuldb.com/?id.174511
  3. https://www.cybersecurity-help.cz/vdb/SB2021050315

Revision


Related Articles