-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.0111
    APSB22-01 : Security update available for Adobe Acrobat and Reader
                              12 January 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Acrobat DC
                   Acrobat Reader DC
                   Acrobat
                   Acrobat Reader
Publisher:         Adobe
Operating System:  Windows
                   macOS
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account            
                   Increased Privileges            -- Remote with User Interaction
                   Denial of Service               -- Existing Account            
                   Unauthorised Access             -- Remote with User Interaction
                   Access Confidential Data        -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-45068 CVE-2021-45067 CVE-2021-45064
                   CVE-2021-45063 CVE-2021-45062 CVE-2021-45061
                   CVE-2021-45060 CVE-2021-44742 CVE-2021-44741
                   CVE-2021-44740 CVE-2021-44739 CVE-2021-44715
                   CVE-2021-44714 CVE-2021-44713 CVE-2021-44712
                   CVE-2021-44711 CVE-2021-44710 CVE-2021-44709
                   CVE-2021-44708 CVE-2021-44707 CVE-2021-44706
                   CVE-2021-44705 CVE-2021-44704 CVE-2021-44703
                   CVE-2021-44702 CVE-2021-44701 

Original Bulletin: 
   https://helpx.adobe.com/security/products/acrobat/apsb22-01.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update available for Adobe Acrobat and Reader | APSB22-01

Bulletin ID                  Date Published                 Priority

APSB22-01                    January 11, 2022               2


Summary

Adobe has released security updates for Adobe Acrobat and Reader for Windows
and macOS. These updates address multiple critical , important and moderate 
vulnerabilities. Successful exploitation could lead to arbitrary code
execution, memory leak, application denial of service, security feature bypass
and privilege escalation.

Affected Versions

Product            Track        Affected Versions                Platform

Acrobat DC         Continuous   21.007.20099 and earlier         Windows
                                versions


Acrobat Reader DC  Continuous   21.007.20099 and earlier         Windows
                                versions


                   Continuous   21.007.20099 and earlier
Acrobat DC                      versions                         macOS


                   Continuous   21.007.20099 and earlier
Acrobat Reader DC               versions                         macOS


                                20.004.30017 and earlier         Windows &
Acrobat 2020       Classic 2020 versions                         macOS


Acrobat Reader     Classic 2020 20.004.30017 and earlier         Windows &
2020                            versions                         macOS

Acrobat 2017       Classic 2017 17.011.30204 and earlier         Windows &
                                versions                         macOS

Acrobat Reader                  17.011.30204 and earlier         Windows &
2017               Classic 2017 versions                         macOS



For questions regarding Acrobat DC, please visit the Acrobat DC FAQ page .

For questions regarding Acrobat Reader DC, please visit the Acrobat Reader DC
FAQ page .


Solution

Adobe recommends users update their software installations to the latest
versions by following the instructions below.

The latest product versions are available to end users via one of the following
methods:

  o Users can update their product installations manually by choosing Help >
    Check for Updates.

  o The products will update automatically, without requiring user
    intervention, when updates are detected.

  o The full Acrobat Reader installer can be downloaded from the Acrobat Reader
    Download Center .

For IT administrators (managed environments):

  o Refer to the specific release note version for links to installers.

  o Install updates via your preferred methodology, such as AIP-GPO,
    bootstrapper, SCUP/SCCM (Windows), or on macOS, Apple Remote Desktop and
    SSH.

Adobe categorizes these updates with the following priority ratings and
recommends users update their installation to the newest version:

Product        Track      Updated      Platform      Priority     Availability
                           Versions                   Rating

Acrobat DC      Continuous 21.011.20039 Windows and   2            Release
                                        macOS                      Notes

Acrobat Reader  Continuous 21.011.20039 Windows and   2            Release
DC                                      macOS                      Notes

Acrobat 2020    Classic    20.004.30020 Windows and   2            Release
                2020                    macOS                      Notes

Acrobat Reader  Classic    20.004.30020 Windows and   2            Release
2020            2020                    macOS                      Notes

Acrobat 2017    Classic    17.011.30207 Windows and   2            Release
                2017                    macOS                      Notes

Acrobat Reader  Classic    17.011.30207 Windows and   2            Release
2017            2017                    macOS                      Notes


Vulnerability Details

Vulnerability Vulnerability     Severity     CVSS base    CVSS vector  CVE Number
Category      Impact                         score
                                                          CVSS:3.0/
Use After     Arbitrary code                              AV:L/AC:L/
Free          execution         Critical     7.8          PR:N/UI:R/   CVE-2021-44701
(CWE-416)                                                 S:U/C:H/I:H/
                                                          A:H
Improper                                                  CVSS:3.1/
Access        Privilege                                   AV:N/AC:L/
Control       escalation        Critical     7.5          PR:N/UI:R/   CVE-2021-44702
(CWE-284)                                                 S:C/C:H/I:N/
                                                          A:N
Stack-based                                               CVSS:3.1/
Buffer        Arbitrary code                              AV:L/AC:L/
Overflow      execution         Critical     7.8          PR:N/UI:R/   CVE-2021-44703
(CWE-121)                                                 S:U/C:H/I:H/
                                                          A:H
                                                          CVSS:3.1/
Use After     Arbitrary code                              AV:L/AC:L/
Free          execution         Critical     7.8          PR:N/UI:R/   CVE-2021-44704
(CWE-416)                                                 S:U/C:H/I:H/
                                                          A:H
Access of                                                 CVSS:3.1/
Uninitialized Arbitrary code                              AV:L/AC:L/
Pointer       execution         Critical     7.8          PR:N/UI:R/   CVE-2021-44705
(CWE-824)                                                 S:U/C:H/I:H/
                                                          A:H
                                                          CVSS:3.1/
Use After     Arbitrary code                              AV:L/AC:L/
Free          execution         Critical     7.8          PR:N/UI:R/   CVE-2021-44706
(CWE-416)                                                 S:U/C:H/I:H/
                                                          A:H
                                                          CVSS:3.1/
Out-of-bounds Arbitrary code                              AV:L/AC:L/
Write         execution         Critical     7.8          PR:N/UI:R/   CVE-2021-44707
(CWE-787)                                                 S:U/C:H/I:H/
                                                          A:H
Heap-based                                                CVSS:3.1/
Buffer        Arbitrary code                              AV:L/AC:L/
Overflow      execution         Critical     7.8          PR:N/UI:R/   CVE-2021-44708
(CWE-122)                                                 S:U/C:H/I:H/
                                                          A:H
Heap-based                                                CVSS:3.1/
Buffer        Arbitrary code                              AV:L/AC:L/
Overflow      execution         Critical     7.8          PR:N/UI:R/   CVE-2021-44709
(CWE-122)                                                 S:U/C:H/I:H/
                                                          A:H
                                                          CVSS:3.1/
Use After     Arbitrary code                              AV:L/AC:L/
Free          execution         Critical     7.8          PR:N/UI:R/   CVE-2021-44710
(CWE-416)                                                 S:U/C:H/I:H/
                                                          A:H
Integer                                                   CVSS:3.1/
Overflow or   Arbitrary code                              AV:L/AC:L/
Wraparound    execution         Critical     7.8          PR:N/UI:R/   CVE-2021-44711
(CWE-190)                                                 S:U/C:H/I:H/
                                                          A:H
Improper                                                  CVSS:3.1/
Input         Application                                 AV:L/AC:L/
Validation    denial-of-service Important    4.4          PR:N/UI:R/   CVE-2021-44712
(CWE-20)                                                  S:U/C:L/I:N/
                                                          A:L
                                                          CVSS:3.1/
Use After     Application                                 AV:L/AC:L/
Free          denial-of-service Important    5.5          PR:N/UI:R/   CVE-2021-44713
(CWE-416)                                                 S:U/C:N/I:N/
                                                          A:H
Violation of                                              CVSS:3.1/
Secure Design Security feature                            AV:L/AC:H/
Principles    bypass            Moderate     2.5          PR:N/UI:R/   CVE-2021-44714
(CWE-657)                                                 S:U/C:L/I:N/
                                                          A:N
                                                          CVSS:3.1/
Out-of-bounds                                             AV:L/AC:L/
Read          Memory Leak       Moderate     3.3          PR:N/UI:R/   CVE-2021-44715
(CWE-125)                                                 S:U/C:L/I:N/
                                                          A:N
Improper                                                  CVSS:3.1/
Input         Security feature                            AV:A/AC:L/
Validation    bypass            Moderate     3.5          PR:N/UI:R/   CVE-2021-44739
(CWE-20)                                                  S:U/C:L/I:N/
                                                          A:N
                                                          CVSS:3.1/
NULL Pointer  Application                                 AV:L/AC:L/
Dereference   denial-of-service Moderate     3.3          PR:N/UI:R/   CVE-2021-44740
(CWE-476)                                                 S:U/C:N/I:N/
                                                          A:L
                                                          CVSS:3.1/
NULL Pointer  Application                                 AV:L/AC:L/
Dereference   denial-of-service Moderate     3.3          PR:N/UI:R/   CVE-2021-44741
(CWE-476)                                                 S:U/C:N/I:N/
                                                          A:L
                                                          CVSS:3.1/
Out-of-bounds                                             AV:L/AC:L/
Read          Memory Leak       Moderate     3.3          PR:N/UI:R/   CVE-2021-44742
(CWE-125)                                                 S:U/C:L/I:N/
                                                          A:N
                                                          CVSS:3.0/
Out-of-bounds Arbitrary code                              AV:L/AC:L/
Read          execution         Critical     7.8          PR:N/UI:R/   CVE-2021-45060
(CWE-125)                                                 S:U/C:H/I:H/
                                                          A:H
                                                          CVSS:3.0/
Out-of-bounds Arbitrary code                              AV:L/AC:L/
Write         execution         Critical     7.8          PR:N/UI:R/   CVE-2021-45061
(CWE-787)                                                 S:U/C:H/I:H/
                                                          A:H
                                                          CVSS:3.0/
Use After     Arbitrary code                              AV:L/AC:L/
Free          execution         Critical     7.8          PR:N/UI:R/   CVE-2021-45062
(CWE-416)                                                 S:U/C:H/I:H/
                                                          A:H
                                                          CVSS:3.0/
Use After     Privilege                                   AV:L/AC:L/
Free          escalation        Moderate     3.3          PR:N/UI:R/   CVE-2021-45063
(CWE-416)                                                 S:U/C:L/I:N/
                                                          A:N
                                                          CVSS:3.0/
Use After     Arbitrary code                              AV:L/AC:L/
Free          execution         Critical     7.8          PR:N/UI:R/   CVE-2021-45064
(CWE-416)                                                 S:U/C:H/I:H/
                                                          A:H
Access of                                                 CVSS:3.1/
Memory                                                    AV:L/AC:L/
Location      Memory Leak       Important    5.5          PR:N/UI:R/   CVE-2021-45067
After End of                                              S:U/C:H/I:N/
Buffer                                                    A:N
(CWE-788)
                                                          CVSS:3.0/
Out-of-bounds Arbitrary code                              AV:L/AC:L/
Write         execution         Critical     7.8          PR:N/UI:R/   CVE-2021-45068
(CWE-787)                                                 S:U/C:H/I:H/
                                                          A:H

Acknowledgements

Adobe would like to thank the following for reporting these issues and for
working with Adobe to help protect our customers:

  o Ashfaq Ansari and Krishnakant Patil - HackSys Inc working with Trend Micro
    Zero Day Initiative (CVE-2021-44701)
  o j00sean (j00sean) ( CVE-2021-44702, CVE-2021-44739)
  o Kai Lu of Zscaler's ThreatLabz ( CVE-2021-44703, CVE-2021-44708,
    CVE-2021-44709, CVE-2021-44740, CVE-2021-44741)
  o PangU via TianfuCup (CVE-2021-44704)
  o StakLeader via TianfuCup (CVE-2021-44705)
  o Kunlun Lab via TianfuCup (CVE-2021-44706)
  o Vulnerability Research Institute Juvenile Via TianfuCup (CVE-2021-44707)
  o Jaewon Min and Aleksandar Nikolic of Cisco Talos (CVE-2021-44710,
    CVE-2021-44711)
  o Sanjeev Das (sd001) (CVE-2021-44712)
  o Rocco Calvi (TecR0c) and Steven Seeley of Qihoo 360 ( CVE-2021-44713,
    CVE-2021-44715)
  o chamal (chamal) ( CVE-2021-44714)
  o fr0zenrain of Baidu Security (fr0zenrain) ( CVE-2021-44742)
  o Anonymous working with Trend Micro Zero Day Initiative (CVE-2021-45060,
    CVE-2021-45061, CVE-2021-45062, CVE-2021-45063; CVE-2021-45068)
  o Rich working with Trend Micro Zero Day Initiative (CVE-2021-45064)
  o Ashfaq Ansari (ashfaqansari) (CVE-2021-45067)

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=milF
-----END PGP SIGNATURE-----