Bulletin ID
Security Update Available for Adobe InDesign | APSB24-91
|
Date Published |
Priority |
---|---|---|
APSB24-91 |
November 21, 2024 |
3 |
Summary
Adobe has released a security update for Adobe InDesign. This update addresses an important vulnerability. Successful exploitation could lead to memory leak.
Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates.
Affected Versions
Product |
Affected version |
Platform |
Adobe InDesign |
ID20.0 and earlier versions |
Windows and macOS |
Adobe InDesign |
ID19.5 and earlier version. |
Windows and macOS |
Solution
Adobe categorizes these updates with the following priority rating and recommends users update their software installations via the Creative Cloud desktop app updater, or by navigating to the InDesign Help menu and clicking "Updates." For more information, please reference this help page.
Product |
Updated version |
Platform |
Priority rating |
Adobe InDesign |
ID20.0.1 |
Windows and macOS |
3 |
Adobe InDesign |
ID19.5.1 |
Windows and macOS |
3 |
For managed environments, IT administrators can use the Creative Cloud Packager to create deployment packages. Refer to this help page for more information.
Vulnerability Details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVSS base score |
CVE Number |
|
---|---|---|---|---|---|
Out-of-bounds Read (CWE-125) |
Memory leak |
Important |
5.5 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
CVE-2024-49529 |
Acknowledgments
Adobe would like to thank the following researcher for reporting this issue and for working with Adobe to help protect our customers:
- Mat Powell of Trend Micro Zero Day Initiative - CVE-2024-49529
NOTE: Adobe has a private, invite-only, bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please fill out this form for next steps.
For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com