Bulletin ID
Security Updates Available for Adobe Bridge | APSB23-57
|
Date Published |
Priority |
---|---|---|
APSB23-57 |
November 14, 2023 |
3 |
Summary
Adobe has released a security update for Adobe Bridge. This update addresses moderate vulnerabilities that could lead to memory leak.
Affected Versions
Product |
Version |
Platform |
---|---|---|
Adobe Bridge |
13.0.4 and earlier versions |
Windows and macOS |
Adobe Bridge |
14.0.0 and earlier versions |
Windows and macOS |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version via the Creative Cloud desktop app's update mechanism. For more information, please reference this help page.
Product |
Version |
Platform |
Priority |
Availability |
---|---|---|---|---|
Adobe Bridge |
13.0.5 |
Windows and macOS |
3 |
|
Adobe Bridge |
14.0.1 |
Windows and macOS |
3 |
Vulnerability Details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVSS base score |
CVE Numbers |
|
---|---|---|---|---|---|
Access of Uninitialized Pointer (CWE-824) |
Memory leak |
Moderate |
3.3 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
CVE-2023-44327 |
Use After Free (CWE-416) |
Memory leak |
Moderate |
3.3 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
CVE-2023-44328 |
Access of Uninitialized Pointer (CWE-824) |
Memory leak |
Moderate |
3.3 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
CVE-2023-44329 |
Acknowledgments
Adobe would like to thank the following researcher for reporting this issue and for working with Adobe to help protect our customers:
- Mat Powell of Trend Micro Zero Day Initiative - CVE-2023-44327, CVE-2023-44328, CVE-2023-44329
NOTE: Adobe has a private, invite-only, bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please fill out this form for next steps.
For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com