First published: Thu Apr 22 2021(Updated: )
A logic issue was addressed with improved state management. This issue is fixed in iTunes 12.11.3 for Windows, Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iCloud for Windows 12.3, macOS Big Sur 11.3, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing a maliciously crafted font may result in the disclosure of process memory.
Credit: Xingwei Lin Ant Security LightXingwei Lin Ant Security LightXingwei Lin Ant Security LightXingwei Lin Ant Security LightXingwei Lin Ant Security LightXingwei Lin Ant Security LightXingwei Lin Ant Security LightXingwei Lin Ant Security Light product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <12.11.3 | 12.11.3 |
Apple Mojave | ||
Apple iCloud for Windows | <12.3 | 12.3 |
Apple Catalina | ||
Apple macOS Big Sur | <11.3 | 11.3 |
Apple tvOS | <14.5 | 14.5 |
Apple watchOS | <7.4 | 7.4 |
Apple iOS | <14.5 | 14.5 |
Apple iPadOS | <14.5 | 14.5 |
Apple Icloud Windows | <12.3 | |
Apple Itunes Windows | <12.11.3 | |
Apple iPadOS | <14.5 | |
Apple iPhone OS | <14.5 | |
Apple Mac OS X | >=10.14<=10.14.5 | |
Apple Mac OS X | >=10.15<=10.15.5 | |
Apple Mac OS X | =10.14.6 | |
Apple Mac OS X | =10.14.6-security_update_2019-001 | |
Apple Mac OS X | =10.14.6-security_update_2019-002 | |
Apple Mac OS X | =10.14.6-security_update_2019-004 | |
Apple Mac OS X | =10.14.6-security_update_2019-005 | |
Apple Mac OS X | =10.14.6-security_update_2019-006 | |
Apple Mac OS X | =10.14.6-security_update_2019-007 | |
Apple Mac OS X | =10.14.6-security_update_2020-001 | |
Apple Mac OS X | =10.14.6-security_update_2020-002 | |
Apple Mac OS X | =10.14.6-security_update_2020-003 | |
Apple Mac OS X | =10.14.6-security_update_2020-004 | |
Apple Mac OS X | =10.14.6-security_update_2020-005 | |
Apple Mac OS X | =10.14.6-security_update_2020-006 | |
Apple Mac OS X | =10.14.6-security_update_2020-007 | |
Apple Mac OS X | =10.14.6-security_update_2021-001 | |
Apple Mac OS X | =10.14.6-security_update_2021-002 | |
Apple Mac OS X | =10.14.6-supplemental_update | |
Apple Mac OS X | =10.14.6-supplemental_update_2 | |
Apple Mac OS X | =10.15.6 | |
Apple Mac OS X | =10.15.6-supplemental_update | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2020-005 | |
Apple Mac OS X | =10.15.7-security_update_2020-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-supplemental_update | |
Apple macOS | >=11.0<11.3 | |
Apple tvOS | <14.5 | |
Apple watchOS | <7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2021-1811 is a vulnerability in CoreText that was addressed with improved state management.
CVE-2021-1811 affects Apple iOS up to version 14.5, Apple iPadOS up to version 14.5, Apple watchOS up to version 7.4, Apple iTunes for Windows up to version 12.11.3, Apple iCloud for Windows up to version 12.3, Apple macOS Big Sur up to version 11.3, Apple tvOS up to version 14.5, Apple Catalina, and Apple Mojave.
The severity of CVE-2021-1811 is not provided in the information available.
To fix CVE-2021-1811, update your Apple software to the latest version as recommended by Apple.
You can find more information about CVE-2021-1811 on the official Apple support page: [link](https://support.apple.com/en-us/HT212321)