9.3
CVSSv2

CVE-2021-30735

Published: 08/09/2021 Updated: 22/09/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the LLIntGenerator object. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple macos

apple mac os x

apple mac os x 10.14.6

apple mac os x 10.15.7

Github Repositories

Pwn2Own 2021 - Safari Full Chain This repo contains exploit source code used by RET2 Systems at Pwn2Own 2021 It has been released for educational purposes, with accompanying blogposts for the RCE and EOP A followup post covers a modified EOP that bypasses KASLR in a different manner (corresponding to the eop_hib directory here) The exploit was demonstrated on Safari 1403,