CVE-2021-44186

Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SGI file.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Jan 2022, 14:29

Type Values Removed Values Added
CPE cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
References (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html - (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html - Vendor Advisory

14 Jan 2022, 20:15

Type Values Removed Values Added
Summary Adobe Bridge versions 11.1.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SGI file. Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SGI file.
References
  • {'url': 'https://helpx.adobe.com/security/products/bridge/apsb21-94.html', 'name': 'https://helpx.adobe.com/security/products/bridge/apsb21-94.html', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1452/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1452/', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html -

10 Dec 2021, 20:34

Type Values Removed Values Added
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1452/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1452/ - Third Party Advisory, VDB Entry
CVSS v2 : 4.3
v3 : 5.5
v2 : 4.3
v3 : 3.3

08 Dec 2021, 17:15

Type Values Removed Values Added
References
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1452/ -

08 Dec 2021, 16:23

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 3.3
v2 : 4.3
v3 : 5.5
References (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - Vendor Advisory
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*

07 Dec 2021, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-07 14:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-44186

Mitre link : CVE-2021-44186

CVE.ORG link : CVE-2021-44186


JSON object : View

Products Affected

apple

  • macos

adobe

  • bridge

microsoft

  • windows
CWE
CWE-125

Out-of-bounds Read