Bulletin ID
Security update available for Adobe Photoshop | APSB24-89
|
Date Published |
Priority |
---|---|---|
APSB24-89 |
November 12, 2024 |
3 |
Summary
Adobe has released an update for Photoshop for Windows and macOS. This update resolves a critical vulnerability. Successful exploitation could lead to arbitrary code execution.
Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates.
Affected Versions
Product |
Affected version |
Platform |
Photoshop 2023 |
24.7.3 and earlier versions |
Windows and macOS |
Photoshop 2024 |
25.11 and earlier versions |
Windows and macOS |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version via the Creative Cloud desktop app’s update mechanism. For more information, please reference this help page.
Product |
Updated versions |
Platform |
Priority |
Photoshop 2023 |
24.7.4 |
Windows and macOS |
3 |
Photoshop 2024 |
25.12 |
Windows and macOS |
3 |
For managed environments, IT administrators can use the Admin Console to deploy Creative Cloud applications to end users. Refer to this help page for more information.
Vulnerability Details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVSS base score |
CVE Number |
|
---|---|---|---|---|---|
Integer Underflow (Wrap or Wraparound) (CWE-191) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2024-49514 |
Acknowledgments
Adobe would like to thank the following researcher for reporting this issue and for working with Adobe to help protect our customers:
- yjdfy - CVE-2024-49514
NOTE: Adobe has a private, invite-only, bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please fill out this form for next steps.
For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com.
For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com.