Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an use-after-free vulnerability in the processing of Format event actions that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/bridge/apsb22-03.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Jan 2022, 15:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.5 |
References | (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html - Vendor Advisory |
14 Jan 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-14 20:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-45051
Mitre link : CVE-2021-45051
CVE.ORG link : CVE-2021-45051
JSON object : View
Products Affected
apple
- macos
adobe
- bridge
microsoft
- windows
CWE
CWE-416
Use After Free