CVE-2021-21798 — Return of Stack Variable Address in Nitro PRO
Severity
7.8HIGHNVD
EPSS
63.4%
top 1.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 15
Latest updateMay 24
Description
An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a stack variable to go out of scope, resulting in the application dereferencing a stale pointer. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger the vulnerability.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
2GHSA▶
GHSA-4vm8-m2w2-wpqm: An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF↗2022-05-24
CVEList▶
CVE-2021-21798: An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF↗2021-09-15