Bulletin ID
Security Update Available for Adobe InDesign | APSB21-73
|
Date Published |
Priority |
---|---|---|
APSB21-73 |
September 14, 2021 |
3 |
Summary
Adobe has released a security update for Adobe InDesign. This update addresses multiple critical vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Affected versions
Product |
Affected version |
Platform |
Adobe InDesign |
16.3.2 and earlier versions |
macOS |
Adobe InDesign |
16.3 and earlier versions |
Windows |
Solution
Adobe categorizes these updates with the following priority rating and recommends users update their software installations via the Creative Cloud desktop app updater, or by navigating to the InDesign Help menu and clicking "Updates." For more information, please reference this help page.
Product |
Updated version |
Platform |
Priority rating |
Availability |
Adobe InDesign |
16.4 |
Windows and macOS |
3 |
|
Adobe InDesign |
15.1.4 |
Windows and macOS |
3 |
|
For managed environments, IT administrators can use the Creative Cloud Packager to create deployment packages. Refer to this help page for more information.
Vulnerability Details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVSS base score |
CVE Number |
|
---|---|---|---|---|---|
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
8.8 |
CVSS3.1:/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-39820 |
Out-of-bounds Read (CWE-125) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-39821 CVE-2021-39822 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
7.8 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVE-2021-40727 |
Acknowledgments
Adobe would like to thank the following researchers for reporting these issues and for working with Adobe to help protect our customers:
- Francis Provencher{PRL} working with Trend Micro Zero Day Initiative (CVE-2021-39821, CVE-2021-39822)
- CQY of Topsec Alpha Team (yjdfy) (CVE-2021-39820, CVE-2021-40727)
Revision
July 14, 2021: Replaced CVE-2021-21043 with CVE-2021-36004
July 28, 2021: Updated Affected Version and Solution Table.
September 29, 2021: Added N-1 version details under the solution section.
September 30, 2021: Added details for CVE-2021-40727.
October 4, 2021: Removed link to Release Notes for version 15.1.4.
For more information, visit https://helpx.adobe.com/security.html , or email PSIRT@adobe.com