Bulletin ID
Security Updates Available for Adobe Prelude | APSB21-96
|
Date Published |
Priority |
---|---|---|
ASPB21-96 |
October 26, 2021 |
3 |
Summary
Affected Versions
Product |
Version |
Platform |
---|---|---|
Adobe Prelude |
10.1 and earlier versions |
Windows |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version via the Creative Cloud desktop app’s update mechanism. For more information, please reference this help page.
Product |
Version |
Platform |
Priority Rating |
Availability |
---|---|---|---|---|
Adobe Prelude |
22.0 |
Windows and macOS |
3 |
For managed environments, IT administrators can use the Admin Console to deploy Creative Cloud applications to end users. Refer to this help page for more information.
Vulnerability details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVSS base score |
CVE Numbers |
|
---|---|---|---|---|---|
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-40770 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-40771 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-40772 |
NULL Pointer Dereference (CWE-476) |
Application denial-of-service |
Important |
5.5 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
CVE-2021-40773 |
NULL Pointer Dereference (CWE-476) |
Application denial-of-service |
Important |
5.5 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
CVE-2021-40774 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-40775 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-42738 CVE-2021-43011 CVE-2021-43012 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-42737 |
Improper Input Validation (CWE-20) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-42733 |
Acknowledgments
Adobe would like to thank the following researchers for reporting these issues and for working with Adobe to help protect our customers:
(hy350) HY350 of Topsec Alpha Team (CVE-2021-40773; CVE-2021-40774)
(yjdfy) CQY of Topsec Alpha Team (CVE-2021-40775; CVE-2021-42738; CVE-2021-42737; CVE-2021-42733, CVE-2021-43011, CVE-2021-43012)
(cff_123) CFF of Topsec Alpha Team (CVE-2021-40772; CVE-2021-40771; CVE-2021-40770)
Revisions
- October 28, 2021: Added details for CVE-2021-43011 and CVE-2021-43012.
- November 2, 2021: Updated acknowledgements for CVE-2021-40733.
- November 11, 2021: Updated vulnerability details for CVE-2021-40773
- January 27, 2022: Updated CVSS details for CVE-2021-40770, CVE-2021-40773
For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com