CVE-2021-44187

Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SGI file.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Jan 2022, 14:30

Type Values Removed Values Added
References (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html - (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html - Vendor Advisory
CPE cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*
First Time Apple
Apple macos

14 Jan 2022, 20:15

Type Values Removed Values Added
Summary Adobe Bridge versions 11.1.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SGI file. Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SGI file.
References
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1451/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1451/', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • {'url': 'https://helpx.adobe.com/security/products/bridge/apsb21-94.html', 'name': 'https://helpx.adobe.com/security/products/bridge/apsb21-94.html', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • (MISC) https://helpx.adobe.com/security/products/bridge/apsb22-03.html -

10 Dec 2021, 20:39

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 5.5
v2 : 4.3
v3 : 3.3
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1451/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1451/ - Third Party Advisory, VDB Entry

08 Dec 2021, 17:15

Type Values Removed Values Added
References
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1451/ -

08 Dec 2021, 16:23

Type Values Removed Values Added
References (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - (MISC) https://helpx.adobe.com/security/products/bridge/apsb21-94.html - Vendor Advisory
CVSS v2 : unknown
v3 : 3.3
v2 : 4.3
v3 : 5.5
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*

07 Dec 2021, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-07 14:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-44187

Mitre link : CVE-2021-44187

CVE.ORG link : CVE-2021-44187


JSON object : View

Products Affected

microsoft

  • windows

adobe

  • bridge

apple

  • macos
CWE
CWE-125

Out-of-bounds Read