Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-35991: Adobe Security Bulletin

Adobe Bridge version 11.0.2 (and earlier) is affected by an uninitialized variable vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVE
#vulnerability#mac#windows#buffer_overflow#auth#zero_day

Security Updates Available for Adobe Bridge | APSB21-53

Bulletin ID

Date Published

Priority

APSB21-53

July 13, 2021

3

Summary

Adobe has released a security update for Adobe Bridge. This update addresses critical and moderate
vulnerabilities that could lead to arbitrary code execution in the context of the current user.

Affected Versions

Product

Version

Platform

Adobe Bridge

11.0.2 and earlier versions

Windows

Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version via the Creative Cloud desktop app’s update mechanism.  For more information, please reference this help page.

Product

Version

Platform

Priority

Availability

Adobe Bridge

11.1

Windows and macOS

3

Download Page

Adobe Bridge

10.1.3

Windows and macOS

3

Download Page

Vulnerability details

Vulnerability Category

Vulnerability Impact

Severity

CVSS base score

CVSS vector

CVE Numbers

Heap-based Buffer Overflow

(CWE-122)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-28624

Out-of-bounds Read (CWE-125)

Arbitrary file system read

Moderate

3.3

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

CVE-2021-35992

Improper Input Validation

(CWE-20)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-35991

Out-of-bounds Write

(CWE-787)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-35989

CVE-2021-35990

Acknowledgments

Adobe would like to thank the following researchers for reporting these issues and for working with Adobe to help protect our customers:

  • Tran Van Khang - khangkito (VinCSS) working with Trend Micro Zero Day Initiative (CVE-2021-28624)
  • Mat Powell (@mrpowell) & Joshua Smith (@kernelsmith) of Trend Micro Zero Day Initiative (CVE-2021-35989 , CVE-2021-35990, CVE-2021-35992 )
  • Mat Powell of Trend Micro Zero Day Initiative (CVE-2021-35991)

Revisions

August 20, 2021: Added N-1 version details under the solution section.

For more information, visit https://helpx.adobe.com/security.html , or email [email protected]

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907