Bulletin ID
Security Updates Available for Adobe Character Animator | APSB21-95
|
Date Published |
Priority |
---|---|---|
ASPB21-95 |
October 26, 2021 |
3 |
Summary
Affected Versions
Product |
Version |
Platform |
---|---|---|
Character Animator 2021 |
4.4 and earlier versions |
Windows and macOS |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version via the Creative Cloud desktop app’s update mechanism. For more information, please reference this help page.
Product |
Version |
Platform |
Priority Rating |
Availability |
---|---|---|---|---|
Character Animator 2021 |
4.4.2 |
Windows and macOS |
3 |
|
Character Animator 2022 |
22.0 |
Windows and macOS |
3 |
|
For managed environments, IT administrators can use the Admin Console to deploy Creative Cloud applications to end users. Refer to this help page for more information.
Vulnerability details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVSS base score |
CVE Numbers |
|
---|---|---|---|---|---|
NULL Pointer Dereference (CWE-476) |
Application denial of service |
Important |
5.5 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
CVE-2021-40762 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary Code Execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-40763 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-40764 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code executio |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-40765 |
Out-of-bounds Read (CWE-125) |
Arbitrary file system read |
Moderate |
3.3 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
CVE-2021-40766 |
Access of Memory Location After End of Buffer (CWE-788) |
Application denial of service |
Important |
5.5 |
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
CVE-2021-40767 |
NULL Pointer Dereference (CWE-476) |
Application denial of service |
Important |
5.5 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
CVE-2021-40768 |
Out-of-bounds Read (CWE-125) |
Privilege escalation |
Moderate |
4.0 |
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
CVE-2021-40769 |
Acknowledgments
Adobe would like to thank the following researchers for reporting these issues and for working with Adobe to help protect our customers:
(hy350) HY350 of Topsec Alpha Team CVE-2021-40762; CVE-2021-40768
(yjdfy) CQY of Topsec Alpha Team CVE-2021-40763; CVE-2021-40764; CVE-2021-40765; CVE-2021-40767
- Mat Powell working with Trend Micro Zero Day Initiative (CVE-2021-40769)
- Francis Provencher working with Trend Micro Zero Day Initiative (CVE-2021-40766)
Revisions
- October 27th, 2021 - Updated acknowledgments for CVE-2021-40769
For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com