Bulletin ID
Security Updates Available for Adobe Illustrator | APSB24-66
|
Date Published |
Priority |
---|---|---|
APSB24-66 |
September 10 2024 |
3 |
Summary
Affected Versions
Product |
Version |
Platform |
---|---|---|
Illustrator 2024 |
28.6 and earlier versions |
Windows and macOS |
Illustrator 2023 |
27.9.5 and earlier versions |
Windows and macOS |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version via the Creative Cloud desktop app's update mechanism. For more information, please reference this help page.
Product |
Version |
Platform |
Priority |
Availability |
---|---|---|---|---|
Illustrator 2024 |
28.7.1 |
Windows and macOS |
3 |
|
Illustrator 2023 |
27.9.6 |
Windows and macOS |
3 |
Vulnerability Details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVSS base score |
CVE Numbers |
|
---|---|---|---|---|---|
Integer Underflow (Wrap or Wraparound) (CWE-191) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2024-41857 |
Integer Overflow or Wraparound (CWE-190) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2024-34121 |
Improper Input Validation (CWE-20) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2024-41856 |
Use After Free (CWE-416) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2024-43758 |
Out-of-bounds Read (CWE-125) |
Memory leak |
Important |
5.5 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
CVE-2024-45111 |
NULL Pointer Dereference (CWE-476) |
Application denial-of-service |
Moderate |
3.3 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
CVE-2024-43759 |
Acknowledgments
Adobe would like to thank the following researchers for reporting this issue and for working with Adobe to help protect our customers:
- yjdfy - CVE-2024-41857, CVE-2024-34121
- Francis Provencher (prl) - CVE-2024-43758, CVE-2024-43759, CVE-2024-41856
- ANONYMOUS - CVE-2024-45111
NOTE: Adobe has a public bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please check us out here: https://hackerone.com/adobe.
Revisions
September 12, 2024: Pulled CVE-2024-45114
September 11, 2024: Added CVE-2024-45114
For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com