
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN089
_____________________________________________________________________

DATE                : 10/02/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S):  Windows, macOS running Adobe Photoshop versions
                                      prior to 21.2.5, 22.2.

=====================================================================
https://helpx.adobe.com/security/products/photoshop/apsb21-10.html
_____________________________________________________________________

Security updates available for Adobe Photoshop | APSB21-10
Bulletin ID 	Date Published        Priority
APSB21-10 	February 09, 2021     	3


Summary

Adobe has released updates for Photoshop for Windows and macOS. These
updates resolve multiple critical vulnerabilities.  Successful
exploitation could lead to arbitrary code execution in the context of
the current user. 


Affected Versions

Product 	Affected version 	Platform
Photoshop 2020  21.2.4 and earlier versions  	Windows and macOS
Photoshop 2021 	22.1.1 and earlier versions	Windows and macOS


Solution

Adobe categorizes these updates with the following priority ratings and
recommends users update their installation to the newest version via
the Creative Cloud desktop app’s update mechanism.  For more
information, please reference this help page.   


Product 	Updated versions 	Platform 	Priority
Photoshop 2020  21.2.5   	Windows and macOS	3
Photoshop 2021 	22.2            Windows and macOS       3

Note:

For managed environments, IT administrators can use the Admin Console to
deploy Creative Cloud applications to end users. Refer to this help page
for more information.


Vulnerability details

Vulnerability Category 	Vulnerability Impact 	Severity    CVE Number
Out-of-bounds read   Arbitrary code execution 	Critical  CVE-2021-21049
                                                          CVE-2021-21050
Buffer Overflow     Arbitrary code execution 	Critical  CVE-2021-21048
                                                          CVE-2021-21051
Out-of-bounds write  Arbitrary code execution 	Critical  CVE-2021-21047


Acknowledgments

Adobe would like to thank the following researchers for
reporting these issues and for working with Adobe to help protect our
customers:  

    Tran Van Khang \xe2\x80\x93 khangkito (VinCSS) working with Trend
Micro Zero Day Initiative (CVE-2021-21047)

    Francis Provencher {PRL} working with Trend Micro Zero Day
Initiative (CVE-2021-21048)

    rgod working with Trend Micro Zero Day Initiative (CVE-2021-21049,
CVE-2021-21050)

    guoxi (CVE-2021-21051)



=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================



