First published: Mon Oct 18 2021(Updated: )
An exploitable use-after-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause an object containing the path to a document to be destroyed and then later reused, resulting in a use-after-free vulnerability, which can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gonitro Nitro Pro | =13.31.0.605 | |
Gonitro Nitro Pro | =13.33.2.645 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21796 is an exploitable use-after-free vulnerability in the JavaScript implementation of Nitro Pro PDF.
CVE-2021-21796 affects Nitro Pro PDF versions 13.31.0.605 and 13.33.2.645.
CVE-2021-21796 has a severity score of 7.8, which is considered high.
CVE-2021-21796 can be exploited by a specially crafted document that causes an object to be destroyed and later reused, resulting in a use-after-free vulnerability.
At the time of this response, there is no known fix for CVE-2021-21796. It is recommended to keep the software up to date and exercise caution when opening untrusted documents.