CVE-2021-21798Return of Stack Variable Address in Nitro PRO

Severity
7.8HIGHNVD
EPSS
63.4%
top 1.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 15
Latest updateMay 24

Description

An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a stack variable to go out of scope, resulting in the application dereferencing a stale pointer. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger the vulnerability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5gonitro/nitro_proNitro Pro 13.31.0.605 , Nitro Pro 13.33.2.645
NVDgonitro/nitro_pro13.31.0.605, 13.33.2.645+1

🔴Vulnerability Details

2
GHSA
GHSA-4vm8-m2w2-wpqm: An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF2022-05-24
CVEList
CVE-2021-21798: An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF2021-09-15

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Code execution vulnerability in Nitro Pro PDF2021-09-13
Talos
Vulnerability Spotlight: Code execution vulnerability in Nitro Pro PDF2021-09-13
CVE-2021-21798 — Return of Stack Variable Address | cvebase