Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.0111 APSB22-01 : Security update available for Adobe Acrobat and Reader 12 January 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Acrobat DC Acrobat Reader DC Acrobat Acrobat Reader Publisher: Adobe Operating System: Windows macOS Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Increased Privileges -- Remote with User Interaction Denial of Service -- Existing Account Unauthorised Access -- Remote with User Interaction Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-45068 CVE-2021-45067 CVE-2021-45064 CVE-2021-45063 CVE-2021-45062 CVE-2021-45061 CVE-2021-45060 CVE-2021-44742 CVE-2021-44741 CVE-2021-44740 CVE-2021-44739 CVE-2021-44715 CVE-2021-44714 CVE-2021-44713 CVE-2021-44712 CVE-2021-44711 CVE-2021-44710 CVE-2021-44709 CVE-2021-44708 CVE-2021-44707 CVE-2021-44706 CVE-2021-44705 CVE-2021-44704 CVE-2021-44703 CVE-2021-44702 CVE-2021-44701 Original Bulletin: https://helpx.adobe.com/security/products/acrobat/apsb22-01.html - --------------------------BEGIN INCLUDED TEXT-------------------- Security update available for Adobe Acrobat and Reader | APSB22-01 Bulletin ID Date Published Priority APSB22-01 January 11, 2022 2 Summary Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address multiple critical , important and moderate vulnerabilities. Successful exploitation could lead to arbitrary code execution, memory leak, application denial of service, security feature bypass and privilege escalation. Affected Versions Product Track Affected Versions Platform Acrobat DC Continuous 21.007.20099 and earlier Windows versions Acrobat Reader DC Continuous 21.007.20099 and earlier Windows versions Continuous 21.007.20099 and earlier Acrobat DC versions macOS Continuous 21.007.20099 and earlier Acrobat Reader DC versions macOS 20.004.30017 and earlier Windows & Acrobat 2020 Classic 2020 versions macOS Acrobat Reader Classic 2020 20.004.30017 and earlier Windows & 2020 versions macOS Acrobat 2017 Classic 2017 17.011.30204 and earlier Windows & versions macOS Acrobat Reader 17.011.30204 and earlier Windows & 2017 Classic 2017 versions macOS For questions regarding Acrobat DC, please visit the Acrobat DC FAQ page . For questions regarding Acrobat Reader DC, please visit the Acrobat Reader DC FAQ page . Solution Adobe recommends users update their software installations to the latest versions by following the instructions below. The latest product versions are available to end users via one of the following methods: o Users can update their product installations manually by choosing Help > Check for Updates. o The products will update automatically, without requiring user intervention, when updates are detected. o The full Acrobat Reader installer can be downloaded from the Acrobat Reader Download Center . For IT administrators (managed environments): o Refer to the specific release note version for links to installers. o Install updates via your preferred methodology, such as AIP-GPO, bootstrapper, SCUP/SCCM (Windows), or on macOS, Apple Remote Desktop and SSH. Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version: Product Track Updated Platform Priority Availability Versions Rating Acrobat DC Continuous 21.011.20039 Windows and 2 Release macOS Notes Acrobat Reader Continuous 21.011.20039 Windows and 2 Release DC macOS Notes Acrobat 2020 Classic 20.004.30020 Windows and 2 Release 2020 macOS Notes Acrobat Reader Classic 20.004.30020 Windows and 2 Release 2020 2020 macOS Notes Acrobat 2017 Classic 17.011.30207 Windows and 2 Release 2017 macOS Notes Acrobat Reader Classic 17.011.30207 Windows and 2 Release 2017 2017 macOS Notes Vulnerability Details Vulnerability Vulnerability Severity CVSS base CVSS vector CVE Number Category Impact score CVSS:3.0/ Use After Arbitrary code AV:L/AC:L/ Free execution Critical 7.8 PR:N/UI:R/ CVE-2021-44701 (CWE-416) S:U/C:H/I:H/ A:H Improper CVSS:3.1/ Access Privilege AV:N/AC:L/ Control escalation Critical 7.5 PR:N/UI:R/ CVE-2021-44702 (CWE-284) S:C/C:H/I:N/ A:N Stack-based CVSS:3.1/ Buffer Arbitrary code AV:L/AC:L/ Overflow execution Critical 7.8 PR:N/UI:R/ CVE-2021-44703 (CWE-121) S:U/C:H/I:H/ A:H CVSS:3.1/ Use After Arbitrary code AV:L/AC:L/ Free execution Critical 7.8 PR:N/UI:R/ CVE-2021-44704 (CWE-416) S:U/C:H/I:H/ A:H Access of CVSS:3.1/ Uninitialized Arbitrary code AV:L/AC:L/ Pointer execution Critical 7.8 PR:N/UI:R/ CVE-2021-44705 (CWE-824) S:U/C:H/I:H/ A:H CVSS:3.1/ Use After Arbitrary code AV:L/AC:L/ Free execution Critical 7.8 PR:N/UI:R/ CVE-2021-44706 (CWE-416) S:U/C:H/I:H/ A:H CVSS:3.1/ Out-of-bounds Arbitrary code AV:L/AC:L/ Write execution Critical 7.8 PR:N/UI:R/ CVE-2021-44707 (CWE-787) S:U/C:H/I:H/ A:H Heap-based CVSS:3.1/ Buffer Arbitrary code AV:L/AC:L/ Overflow execution Critical 7.8 PR:N/UI:R/ CVE-2021-44708 (CWE-122) S:U/C:H/I:H/ A:H Heap-based CVSS:3.1/ Buffer Arbitrary code AV:L/AC:L/ Overflow execution Critical 7.8 PR:N/UI:R/ CVE-2021-44709 (CWE-122) S:U/C:H/I:H/ A:H CVSS:3.1/ Use After Arbitrary code AV:L/AC:L/ Free execution Critical 7.8 PR:N/UI:R/ CVE-2021-44710 (CWE-416) S:U/C:H/I:H/ A:H Integer CVSS:3.1/ Overflow or Arbitrary code AV:L/AC:L/ Wraparound execution Critical 7.8 PR:N/UI:R/ CVE-2021-44711 (CWE-190) S:U/C:H/I:H/ A:H Improper CVSS:3.1/ Input Application AV:L/AC:L/ Validation denial-of-service Important 4.4 PR:N/UI:R/ CVE-2021-44712 (CWE-20) S:U/C:L/I:N/ A:L CVSS:3.1/ Use After Application AV:L/AC:L/ Free denial-of-service Important 5.5 PR:N/UI:R/ CVE-2021-44713 (CWE-416) S:U/C:N/I:N/ A:H Violation of CVSS:3.1/ Secure Design Security feature AV:L/AC:H/ Principles bypass Moderate 2.5 PR:N/UI:R/ CVE-2021-44714 (CWE-657) S:U/C:L/I:N/ A:N CVSS:3.1/ Out-of-bounds AV:L/AC:L/ Read Memory Leak Moderate 3.3 PR:N/UI:R/ CVE-2021-44715 (CWE-125) S:U/C:L/I:N/ A:N Improper CVSS:3.1/ Input Security feature AV:A/AC:L/ Validation bypass Moderate 3.5 PR:N/UI:R/ CVE-2021-44739 (CWE-20) S:U/C:L/I:N/ A:N CVSS:3.1/ NULL Pointer Application AV:L/AC:L/ Dereference denial-of-service Moderate 3.3 PR:N/UI:R/ CVE-2021-44740 (CWE-476) S:U/C:N/I:N/ A:L CVSS:3.1/ NULL Pointer Application AV:L/AC:L/ Dereference denial-of-service Moderate 3.3 PR:N/UI:R/ CVE-2021-44741 (CWE-476) S:U/C:N/I:N/ A:L CVSS:3.1/ Out-of-bounds AV:L/AC:L/ Read Memory Leak Moderate 3.3 PR:N/UI:R/ CVE-2021-44742 (CWE-125) S:U/C:L/I:N/ A:N CVSS:3.0/ Out-of-bounds Arbitrary code AV:L/AC:L/ Read execution Critical 7.8 PR:N/UI:R/ CVE-2021-45060 (CWE-125) S:U/C:H/I:H/ A:H CVSS:3.0/ Out-of-bounds Arbitrary code AV:L/AC:L/ Write execution Critical 7.8 PR:N/UI:R/ CVE-2021-45061 (CWE-787) S:U/C:H/I:H/ A:H CVSS:3.0/ Use After Arbitrary code AV:L/AC:L/ Free execution Critical 7.8 PR:N/UI:R/ CVE-2021-45062 (CWE-416) S:U/C:H/I:H/ A:H CVSS:3.0/ Use After Privilege AV:L/AC:L/ Free escalation Moderate 3.3 PR:N/UI:R/ CVE-2021-45063 (CWE-416) S:U/C:L/I:N/ A:N CVSS:3.0/ Use After Arbitrary code AV:L/AC:L/ Free execution Critical 7.8 PR:N/UI:R/ CVE-2021-45064 (CWE-416) S:U/C:H/I:H/ A:H Access of CVSS:3.1/ Memory AV:L/AC:L/ Location Memory Leak Important 5.5 PR:N/UI:R/ CVE-2021-45067 After End of S:U/C:H/I:N/ Buffer A:N (CWE-788) CVSS:3.0/ Out-of-bounds Arbitrary code AV:L/AC:L/ Write execution Critical 7.8 PR:N/UI:R/ CVE-2021-45068 (CWE-787) S:U/C:H/I:H/ A:H Acknowledgements Adobe would like to thank the following for reporting these issues and for working with Adobe to help protect our customers: o Ashfaq Ansari and Krishnakant Patil - HackSys Inc working with Trend Micro Zero Day Initiative (CVE-2021-44701) o j00sean (j00sean) ( CVE-2021-44702, CVE-2021-44739) o Kai Lu of Zscaler's ThreatLabz ( CVE-2021-44703, CVE-2021-44708, CVE-2021-44709, CVE-2021-44740, CVE-2021-44741) o PangU via TianfuCup (CVE-2021-44704) o StakLeader via TianfuCup (CVE-2021-44705) o Kunlun Lab via TianfuCup (CVE-2021-44706) o Vulnerability Research Institute Juvenile Via TianfuCup (CVE-2021-44707) o Jaewon Min and Aleksandar Nikolic of Cisco Talos (CVE-2021-44710, CVE-2021-44711) o Sanjeev Das (sd001) (CVE-2021-44712) o Rocco Calvi (TecR0c) and Steven Seeley of Qihoo 360 ( CVE-2021-44713, CVE-2021-44715) o chamal (chamal) ( CVE-2021-44714) o fr0zenrain of Baidu Security (fr0zenrain) ( CVE-2021-44742) o Anonymous working with Trend Micro Zero Day Initiative (CVE-2021-45060, CVE-2021-45061, CVE-2021-45062, CVE-2021-45063; CVE-2021-45068) o Rich working with Trend Micro Zero Day Initiative (CVE-2021-45064) o Ashfaq Ansari (ashfaqansari) (CVE-2021-45067) - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYd4tYONLKJtyKPYoAQgGzQ/9GFlEWWUWuijjZQkl86BXed7WWL8RRtmz vo18u1xhj9dzfdLrmq/669E5YIQ1cl3vtKdxSF+obw/RohrFStCSt7zYPxG/BZo1 kVvGKyT4e5hiTWTDEVGZe9W6RhSREXdcVaH19EjMalvOWeipN8dfmwqI6l94oC9B FNOVhaCPIUpaVXJDrGGWytlSOuS3vDE1tlMiluuFRvTLMAQ0Tg1DGk1gRMm87v2C 3qaXwUtCDH0hT1L8nqmvpU4dtrgD6JinvPeyVKqZZqwW+EwUcPFUsbuXY5UeqrJK vh9PJNW01qkxvUEtvSGOSveoroM8iPkMwp4lXGVM3qUE9zv+lpAZhLazjVwmr+Q2 KMV5O/vg5YbIGQc50Zo40Kz96xgwhh8Z+xnU0UCzp9lef72OVp2TjGVJwEaL4gHn 5gNUxq9cnO29wcg1TV+e2zEzl0ewfjPltansd7BDk2Q6gqV041RLDWx8FDH3a1/L WdgZyNXkfYMJNrIiz15m4q03G6q+8LP7smmLn6CScsQKErGhR3TKS/xi3vYqfYem IdV+k0ZtaKcaE8Xlo7BvzcDwsCNUHHWbMhHSlBeUG3EZ4RyIqSjN/UGtzesVZwe7 iZ7Q65mTrNI0RojLvcfXcouj+Y1hAsOf5ph4QzOiO072d97pnSsVtHHbTvMTdOVO wg1btUYdhxo= =milF -----END PGP SIGNATURE-----