Bulletin ID
Security Updates Available for Adobe Illustrator | APSB23-19
|
Date Published |
Priority |
---|---|---|
APSB23-19 |
March 14, 2023 |
3 |
Summary
Affected Versions
Product |
Version |
Platform |
---|---|---|
Illustrator 2023 |
27.2.0 and earlier versions |
Windows and macOS |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version via the Creative Cloud desktop app's update mechanism. For more information, please reference this help page.
Product |
Version |
Platform |
Priority |
Availability |
---|---|---|---|---|
Illustrator 2023 |
27.3.1 |
Windows and macOS |
3 |
Vulnerability details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVSS base score |
CVE Numbers |
|
---|---|---|---|---|---|
Improper Input Validation (CWE-20) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2023-25859 |
Out-of-bounds Write (CWE-787) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2023-25860 |
Out-of-bounds Write (CWE-787) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2023-25861 |
Out-of-bounds Read (CWE-125) |
Memory leak |
Important |
5.5 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
CVE-2023-25862 |
Use After Free (CWE-416) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2023-26426 |
Acknowledgments
Adobe would like to thank the following researcher sfor reporting these issues and for working with Adobe to help protect our customers:
- Mat Powell with Trend Micro Zero Day Initiative - CVE-2023-25859, CVE-2023-25860, CVE-2023-25861, CVE-2023-25862
- Chen Qingyang (yjdfy) - CVE-2023-26426
For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com