Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-39820: Adobe Security Bulletin

Adobe InDesign versions 16.3 (and earlier), and 16.3.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

CVE
#vulnerability#mac#windows#zero_day

Security Update Available for Adobe InDesign | APSB21-73

Bulletin ID

Date Published

Priority

APSB21-73

September 14, 2021

3

Summary

Adobe has released a security update for Adobe InDesign.  This update addresses multiple critical vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.

Affected versions

16.3.2 and earlier versions

16.3 and earlier versions

Solution

Adobe categorizes these updates with the following priority rating and recommends users update their software installations via the Creative Cloud desktop app updater, or by navigating to the InDesign Help menu and clicking “Updates.” For more information, please reference this help page.

Product

Updated version

Platform

Priority rating

Availability

Adobe InDesign

16.4

Windows and macOS

3

Release Note

Adobe InDesign

15.1.4

Windows and macOS

3

For managed environments, IT administrators can use the Creative Cloud Packager to create deployment packages. Refer to this help page for more information.

Vulnerability Details

Vulnerability Category

Vulnerability Impact

Severity

CVSS base score

CVSS vector

CVE Number

Access of Memory Location After End of Buffer

(CWE-788)

Arbitrary code execution

Critical

8.8

CVSS3.1:/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-39820

Out-of-bounds Read

(CWE-125)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-39821

CVE-2021-39822

Access of Memory Location After End of Buffer

(CWE-788)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-40727

Acknowledgments

Adobe would like to thank the following researchers for reporting these issues and for working with Adobe to help protect our customers:

  • Francis Provencher{PRL} working with Trend Micro Zero Day Initiative (CVE-2021-39821, CVE-2021-39822)
  • CQY of Topsec Alpha Team (yjdfy) (CVE-2021-39820, CVE-2021-40727)

Revision

July 14, 2021: Replaced CVE-2021-21043 with CVE-2021-36004

July 28, 2021: Updated Affected Version and Solution Table.

September 29, 2021: Added N-1 version details under the solution section.

September 30, 2021: Added details for CVE-2021-40727.

October 4, 2021: Removed link to Release Notes for version 15.1.4.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907