This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apple mac os x |
||
apple mac os x 10.15.7 |
||
apple macos 12.0 |
||
apple iphone os 15.0 |
||
apple ipad os |
||
apple iphone os |
||
apple macos |
||
apple tvos |
||
apple watchos |
||
apple ipados 15.0 |