Adobe Security Bulletin

Security Updates Available for Adobe Bridge | APSB21-94

Bulletin ID

Date Published

Priority

APSB21-94

October 26, 2021 

2

Summary

Adobe has released a security update for Adobe Bridge. This update addresses critical vulnerabilities that could lead to arbitrary code execution and memory leak.  

  

Affected Versions

Product

Version

Platform

Adobe Bridge  

11.1.1 and earlier versions 

Windows  

Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version via the Creative Cloud desktop app's update mechanism.  For more information, please reference this help page.   

Product

Version

Platform

Priority   

Availability    

Adobe Bridge  

12.0

Windows and macOS    

2

Adobe Bridge  

11.1.2

Windows and macOS    

2

Vulnerability details

Vulnerability Category

Vulnerability Impact

Severity

CVSS base score

CVE Numbers

NULL Pointer Dereference (CWE-476

Memory leak 

Critical 

8.3

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H 

CVE-2021-40750  

Double Free (CWE-415)

Arbitrary code execution 

Critical

7.8

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 

CVE-2021-42533  

Out-of-bounds Read (CWE-125


Arbitrary code execution 
 

Critical  

7.8

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H 

CVE-2021-42719

CVE-2021-42720

Out-of-bounds Read

(CWE-125)

Arbitrary code execution 

Critical 

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 

CVE-2021-42722  

Access of Memory Location After End of Buffer (CWE-788

Arbitrary code execution 

Critical 

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 

CVE-2021-42724  

Out-of-bounds Write
 (CWE-787

Arbitrary code execution 

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 

CVE-2021-42728   

Access of Memory Location After End of Buffer (CWE-788

Arbitrary code execution 

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 

CVE-2021-42729   

Access of Memory Location After End of Buffer

(CWE-788)

Arbitrary code execution 

Critical 

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 

CVE-2021-42730 

Use After Free (CWE-416)

Arbitrary code execution

Critical

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-42721

Acknowledgments

Adobe would like to thank the following researcher for reporting this issue and for working with Adobe to help protect our customers:    

  • (hy350) HY350 of Topsec Alpha Team CVE-2021-40750

  • (yjdfy) CQY of Topsec Alpha Team CVE-2021-42730; CVE-2021-42729; CVE-2021-42721 

  • (cff_123) CFF of Topsec Alpha Team- CVE-2021-42728; CVE-2021-42724; CVE-2021-42722; CVE-2021-42720; CVE-2021-42719
  • Francis Provencher working with Trend Micro Zero Day Initiative (CVE02021-42533)

Revisions

June 16, 2022: Added CVE-2021-42721

December 6th, 2021: Added CVE details for CVE-2021-44185, CVE-2021-44186, CVE-2021-44187

January 11, 2022: Moved CVE details for CVE-2021-44185, CVE-2021-44186, CVE-2021-44187 to bulletin: https://helpx.adobe.com/security/products/bridge/apsb22-03.html


For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com

 Adobe

Pridobite pomoč hitreje in preprosteje

Ali ste nov uporabnik?