CVE-2021-44185

Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious RGB file.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
OR cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*

History

21 Jan 2022, 14:29

Type Values Removed Values Added
CPE cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
References (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html - (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html - Vendor Advisory

14 Jan 2022, 20:15

Type Values Removed Values Added
Summary Adobe Bridge versions 11.1.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious RGB file. Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious RGB file.
References
  • {'url': 'https://helpx.adobe.com/security/products/bridge/apsb21-94.html', 'name': 'https://helpx.adobe.com/security/products/bridge/apsb21-94.html', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1453/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1453/', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html -

10 Dec 2021, 20:32

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 5.5
v2 : 4.3
v3 : 3.3
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1453/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1453/ - Third Party Advisory, VDB Entry

08 Dec 2021, 17:15

Type Values Removed Values Added
References
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1453/ -

08 Dec 2021, 16:22

Type Values Removed Values Added
References (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - Vendor Advisory
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 3.3
v2 : 4.3
v3 : 5.5

07 Dec 2021, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-07 14:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-44185

Mitre link : CVE-2021-44185

CVE.ORG link : CVE-2021-44185


JSON object : View

Products Affected

apple

  • macos

microsoft

  • windows

adobe

  • bridge
CWE
CWE-125

Out-of-bounds Read