
=====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN569
_____________________________________________________________________

DATE                : 27/10/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Security Updates Available for
                      Adobe Bridge versions prior to 12.0, 11.1.2.

=====================================================================
https://helpx.adobe.com/security/products/bridge/apsb21-94.html
_____________________________________________________________________


Last updated on Oct 26, 2021

Security Updates Available for Adobe Bridge | APSB21-94


Bulletin ID        Date Published        Priority

APSB21-94          October 26, 2021      2


Summary

Adobe has released a security update for Adobe Bridge. This
update addresses critical vulnerabilities that could lead to arbitrary
code execution and memory leak.  

  
Affected Versions

Product        Version                         Platform

Adobe Bridge   11.1.1 and earlier versions     Windows 


Solution

Adobe categorizes these updates with the following priority ratings and
recommends users update their installation to the newest version via the
Creative Cloud desktop app's update mechanism.  For more information,
please reference this help page.  


Product     Version      Platform      Priority      Availability   

Adobe Bridge   12.0   Windows and macOS    2       Download Page   

Adobe Bridge   11.1.2 Windows and macOS    2       Download Page   


Vulnerability details

Vulnerability Category   Vulnerability Impact  Severity  CVSS base score
CVSS vector     CVE Numbers

NULL Pointer Dereference (CWE-476)   Memory leak    Critical     8.3
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H    CVE-2021-40750

Double Free (CWE-415)    Arbitrary code execution    Critical    7.8
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H    CVE-2021-42533

Out-of-bounds Read (CWE-125)   Arbitrary code execution   Critical   7.8
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H     CVE-2021-42719

Out-of-bounds Read (CWE-125)   Arbitrary code execution   Critical   7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H   CVE-2021-42720

Out-of-bounds Read (CWE-125)   Arbitrary code execution   Critical   7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H    CVE-2021-42722

Access of Memory Location After End of Buffer (CWE-788)
Arbitrary code execution     Critical    7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H    CVE-2021-42724

Buffer Overflow (CWE-120)   Arbitrary code execution   Critical   7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H    CVE-2021-42728

Access of Memory Location After End of Buffer (CWE-788)
Arbitrary code execution    Critical  7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H    CVE-2021-42729

Access of Memory Location After End of Buffer (CWE-788)
Arbitrary code execution    Critical    7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H    CVE-2021-42730


Acknowledgments

Acknowledgments       

Adobe would like to thank the following researcher for reporting
this issue and for working with Adobe to help protect our customers:    

    (hy350) HY350 of Topsec Alpha Team CVE-2021-40750

    (yjdfy) CQY of Topsec Alpha Team CVE-2021-42730; CVE-2021-42729

    (cff_123) CFF of Topsec Alpha Team- CVE-2021-42728; CVE-2021-42724;
CVE-2021-42722; CVE-2021-42720; CVE-2021-42719

    Francis Provencher working with Trend Micro Zero Day Initiative
(CVE02021-42533)

For more information, visit https://helpx.adobe.com/security.html, or
email PSIRT@adobe.com

=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================



