CVE-2021-44187

Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SGI file.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Jan 2022, 14:30

Type Values Removed Values Added
CPE cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
References (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html - (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html - Vendor Advisory

14 Jan 2022, 20:15

Type Values Removed Values Added
References
  • {'url': 'https://helpx.adobe.com/security/products/bridge/apsb21-94.html', 'name': 'https://helpx.adobe.com/security/products/bridge/apsb21-94.html', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1451/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1451/', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html -
Summary Adobe Bridge versions 11.1.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SGI file. Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SGI file.

10 Dec 2021, 20:39

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 5.5
v2 : 4.3
v3 : 3.3
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1451/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1451/ - Third Party Advisory, VDB Entry

08 Dec 2021, 17:15

Type Values Removed Values Added
References
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1451/ -

08 Dec 2021, 16:23

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 3.3
v2 : 4.3
v3 : 5.5
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*
References (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - Vendor Advisory

07 Dec 2021, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-07 14:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-44187

Mitre link : CVE-2021-44187

CVE.ORG link : CVE-2021-44187


JSON object : View

Products Affected

apple

  • macos

adobe

  • bridge

microsoft

  • windows
CWE
CWE-125

Out-of-bounds Read