An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a stack variable to go out of scope, resulting in the application dereferencing a stale pointer. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger the vulnerability.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-08-03T18:23:29.542Z

Reserved: 2021-01-04T00:00:00

Link: CVE-2021-21798

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-15T14:15:08.687

Modified: 2024-11-21T05:48:59.680

Link: CVE-2021-21798

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses