Bulletin ID
Security Updates Available for Adobe Framemaker | APSB21-74
|
Date Published |
Priority |
---|---|---|
APSB21-74 |
September 14, 2021 |
3 |
Summary
Affected Versions
Product |
Version |
Platform |
---|---|---|
Adobe Framemaker |
2019 Update 8 and earlier |
Windows |
Adobe Framemaker |
2020 Release Update 2 and earlier |
Windows |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product |
Version |
Platform |
Priority |
Availability |
---|---|---|---|---|
Adobe Framemaker |
2019 Release Update 8 |
Windows |
3 |
|
Adobe Framemaker |
2020 Release Update 3 |
Windows |
3 |
Vulnerability details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVSS base score |
CVE Numbers |
|
---|---|---|---|---|---|
Use After Free (CWE-416) |
Arbitrary file system read |
Important |
4.3 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
CVE-2021-39835 |
Out-of-bounds Read (CWE-125) |
Arbitrary file system read |
Moderate |
3.3 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
CVE-2021-40697 |
Out-of-bounds Read (CWE-125) |
Arbitrary file system read |
Important |
4.3 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
CVE-2021-39833 CVE-2021-39834 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-39832 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
8.8 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-39830 |
Out-of-bounds Write (CWE-787) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-39829 CVE-2021-39831 |
Out-of-bounds Read (CWE-125) |
Privilege escalation |
Important |
4.0 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
CVE-2021-39862 CVE-2021-39865 |
Acknowledgments
Adobe would like to thank the following Initiative for reporting the relevant issues and for working with Adobe to help protect our customers:
- Tran Van Khang - khangkito (VinCSS) working with Trend Micro Zero Day (CVE-2021-39829, CVE-2021-39830, CVE-2021-39831)
- Mat Powell of Trend Micro Zero Day Initiative (CVE-2021-39832, CVE-2021-39833, CVE-2021-39834, CVE-2021-39835, CVE-2021-40697, CVE-2021-39862, CVE-2021-39865)
Revisions
January 05, 2022: Tech Note linked to proper page
September 22, 2021: Included details for CVE-2021-39862 and CVE-2021-39865.
For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com