-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.2929
        APSB22-26 : Security update available for Adobe Illustrator
                               15 June 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Adobe Illustrator
Publisher:         Adobe
Operating System:  Windows
                   macOS
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-30669 CVE-2022-30668 CVE-2022-30667
                   CVE-2022-30666 CVE-2022-30649 CVE-2022-30648
                   CVE-2022-30647 CVE-2022-30646 CVE-2022-30645
                   CVE-2022-30644 CVE-2022-30643 CVE-2022-30642
                   CVE-2022-30641 CVE-2022-30640 CVE-2022-30639
                   CVE-2022-30638 CVE-2022-30637 

Original Bulletin: 
   https://helpx.adobe.com/security/products/illustrator/apsb22-26.html

Comment: CVSS (Max):  7.8 CVE-2022-30637 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: Adobe
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Updates Available for Adobe Illustrator | APSB22-26

Bulletin ID                  Date Published                Priority

ASPB22-26                  June 14, 2022                     3


Summary

Adobe has released an update for Adobe Illustrator 2022. This update resolves
critical , important and moderate vulnerabilities that could lead to arbitrary
code execution and memory leak.

Affected Versions

Product                      Version                      Platform

Illustrator 2022     26.0.2 and earlier versions         Windows and macOS

Illustrator 2021     25.4.5 and earlier versions         Windows and macOS


Solution

Adobe categorizes these updates with the following priority ratings and
recommends users update their installation to the newest version via the
Creative Cloud desktop app's update mechanism. For more information, please
reference this help page .

Product        Version        Platform         Priority    Availability

Illustrator 2022     26.3.1   Windows and macOS     3          Download Page

Illustrator 2021     25.4.6   Windows and macOS     3          Download Page


Vulnerability details

Vulnerability  Vulnerability            CVSS
   Category       Impact     Severity   base     CVSS vector      CVE Numbers
                                       score

Out-of-bounds  Arbitrary                      CVSS:3.0/AV:L/AC:L
Write (        code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30637
CWE-787 )      execution                      /I:H/A:H

Improper Input Arbitrary                      CVSS:3.0/AV:L/AC:L
Validation (   code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30638
CWE-20 )       execution                      /I:H/A:H

Out-of-bounds  Arbitrary                      CVSS:3.0/AV:L/AC:L
Write (        code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30639
CWE-787 )      execution                      /I:H/A:H

Out-of-bounds  Arbitrary                      CVSS:3.0/AV:L/AC:L
Write (        code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30640
CWE-787 )      execution                      /I:H/A:H

Out-of-bounds  Arbitrary                      CVSS:3.0/AV:L/AC:L
Write (        code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30641
CWE-787 )      execution                      /I:H/A:H

Out-of-bounds  Arbitrary                      CVSS:3.0/AV:L/AC:L
Write (        code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30642
CWE-787 )      execution                      /I:H/A:H

Out-of-bounds  Arbitrary                      CVSS:3.0/AV:L/AC:L
Write (        code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30643
CWE-787 )      execution                      /I:H/A:H

Use After Free Arbitrary                      CVSS:3.0/AV:L/AC:L
( CWE-416 )    code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30644
               execution                      /I:H/A:H

Out-of-bounds  Arbitrary                      CVSS:3.0/AV:L/AC:L
Write (        code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30645
CWE-787 )      execution                      /I:H/A:H

Improper Input Arbitrary                      CVSS:3.0/AV:L/AC:L
Validation (   code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30646
CWE-20 )       execution                      /I:H/A:H

Use After Free Arbitrary                      CVSS:3.0/AV:L/AC:L
( CWE-416 )    code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30647
               execution                      /I:H/A:H

Use After Free Arbitrary                      CVSS:3.0/AV:L/AC:L
( CWE-416 )    code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30648
               execution                      /I:H/A:H

Out-of-bounds  Arbitrary                      CVSS:3.1/AV:L/AC:L
Write (        code          Critical  7.8    /PR:N/UI:R/S:U/C:H CVE-2022-30649
CWE-787 )      execution                      /I:H/A:H

Out-of-bounds                                 CVSS:3.1/AV:L/AC:L
Read ( CWE-125 Memory leak   Important 5.5    /PR:N/UI:R/S:U/C:H CVE-2022-30666
)                                             /I:N/A:N

Out-of-bounds                                 CVSS:3.1/AV:L/AC:L
Read ( CWE-125 Memory leak   Important 5.5    /PR:N/UI:R/S:U/C:H CVE-2022-30667
)                                             /I:N/A:N

Out-of-bounds                                 CVSS:3.1/AV:L/AC:L
Read ( CWE-125 Memory leak   Important 5.5    /PR:N/UI:R/S:U/C:H CVE-2022-30668
)                                             /I:N/A:N

Out-of-bounds                                 CVSS:3.1/AV:L/AC:L
Read ( CWE-125 Memory leak   Moderate  3.3    /PR:N/UI:R/S:U/C:L CVE-2022-30669
)                                             /I:N/A:N


Acknowledgments

Adobe would like to thank the following researcher sfor reporting these issues
and for working with Adobe to help protect our customers:

  o Yonghui Han (tmgr) of Fortinet's FortiGuard Labs (CVE-2022-30649,
    CVE-2022-30666, CVE-2022-30667, CVE-2022-30668, CVE-2022-30669)
  o Mat Powell of Trend Micro Zero Day Initiative (CVE-2022-30637,
    CVE-2022-30638, CVE-2022-30639, CVE-2022-30640, CVE-2022-30641,
    CVE-2022-30642, CVE-2022-30643, CVE-2022-30644, CVE-2022-30645,
    CVE-2022-30646, CVE-2022-30647, CVE-2022-30648)

Revisions

March 16, 2022: Added affected & fix versions for Illustrator v25.x



For more information, visit https://helpx.adobe.com/security.html , or email
PSIRT@adobe.com

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=5234
-----END PGP SIGNATURE-----