Adobe Products Could Allow for Arbitrary Code Execution

Fortify Security Team
Sep 14, 2021

Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution.

  • Adobe XMP Toolkit SDK is a development kit for Adobe’s Extensible Metadata Platform.
  • Adobe Photoshop and Adobe Photoshop Elements?is a graphics editor.
  • Adobe Experience Manager is a content management solution for building websites, mobile apps, and forms.
  • Adobe Genuine Service is a service that periodically verifies whether Adobe apps on your machine are genuine and notifies you if they are not.
  • Adobe Digital Editions is an e-book reader software program.
  • Adobe Premiere and Adobe Premiere Pro is a video editing software.
  • Adobe Creative Cloud is a cloud service provided by Adobe where its software can be accessed all in one place.
  • Adobe ColdFusion is a web application development platform.
  • Adobe Framemaker is a document processing software used to write and edit large or complex documents.
  • Adobe InDesign is an industry-leading layout and page design software for print and digital media.
  • Adobe SVG Native viewer is a library that parses and renders SVG Native documents.
  • Adobe InCopy is a professional word processor.
  • Acrobat and Reader is a family of application software and Web services mainly used to create, view, and edit PDF documents.

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

THREAT INTELLIGENCE: There are currently no reports of these vulnerabilities being exploited in the wild.

SYSTEMS AFFECTED:

  • Adobe XMP-Toolkit-SDK 2021.07 and earlier versions
    Photoshop 2020 21.2.11 and earlier versions
    Photoshop 2021 22.5 and earlier versions
    Adobe Experience Manager (AEM) 6.5.9.0 and earlier versions
    Adobe Experience Manager (AEM) Cloud Service
    Adobe Genuine Service 7.3 and earlier versions
    Adobe Digital Editions 4.5.11.187646 and below
    Adobe Premiere Elements 2021 [build 19.0 (20210127.daily.2235820) and earlier]
    Photoshop Elements 2021 [build 19.0 (20210304.m.156367) and earlier]
    Creative Cloud Desktop Application 5.4 and earlier version
    ColdFusion 2018 Update 11 and earlier versions
    ColdFusion 2021 Version 1 and earlier versions
    Adobe Framemaker 2019 Update 8 and earlier
    Adobe Framemaker 2020 Release Update 2 and earlier
    Adobe InDesign 16.3.2 and earlier versions for macOS
    Adobe InDesign 16.3 and earlier versions for Windows
    Adobe SVG-Native-Viewer  https://github.com/adobe/svg-native-viewer/commit/8182d14dfad5d1e10f53ed830328d7d9a3cfa96d and earlier versions for Linux
    Adobe InCopy 16.3.1 and earlier versions for macOS
    Adobe InCopy 16.3 and earlier versions for Windows
    Adobe Premiere Pro 15.4 and earlier versions
    Acrobat DC 2021.005.20060 and earlier versions for Windows
    Acrobat Reader DC 2021.005.20060 and earlier versions for Windows
    Acrobat DC 2021.005.20058 and earlier versions for macOS
    Acrobat Reader DC 2021.005.20058 and earlier versions for macOS
    Acrobat 2020 2020.004.30006 and earlier versions
    Acrobat Reader 2020 2020.004.30006 and earlier versions
    Acrobat 2017 2017.011.30199 and earlier versions
    Acrobat Reader 2017 2017.011.30199 and earlier versions

RISK:

Government:

  • Large and medium government entities: Medium
  • Small government entities: Medium

Businesses:

  • Large and medium business entities: Medium
  • Small business entities: Medium

Home users: Low

TECHNICAL SUMMARY:

Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution. Details of these vulnerabilities are as follows:
Adobe XMP-Toolkit-SDK

  • Out-of-bounds Read, which could allow for Arbitrary file system read. (CVE-2021-40716)

Adobe Photoshop 2020 and 2021

  • Buffer Overflow, which could allow for Arbitrary code execution. (CVE-2021-40709)

Adobe Experience Manager (AEM)

  • Cross-site Scripting (XSS), which could allow for Arbitrary code execution. (CVE-2021-40711)
  • Improper Input Validation, which could allow for Application denial-of-service. (CVE-2021-40712)
  • Improper Certificate Validation, which could allow for Security feature bypass. (CVE-2021-40713)
  • Cross-site Scripting (XSS), which could allow for Arbitrary code execution. (CVE-2021-40714)

Adobe?Genuine Service

  • Creation of Temporary File in Directory with Incorrect Permissions, which could allow for Privilege Escalation. (CVE-2021-40708)

Adobe Digital Editions

  • Creation of Temporary File in Directory with Incorrect Permissions, which could allow for Privilege Escalation. (CVE-2021-39828)
  • Creation of Temporary File in Directory with Incorrect Permissions, which could allow for Arbitrary file system write. (CVE-2021-39827)
  • OS Command Injection, which could allow for Arbitrary code execution. (CVE-2021-39826)

Adobe Premiere?Elements

  • Access of Memory Location After End of Buffer, which could allow for Arbitrary code execution. (CVE-2021-39824, CVE-2021-40701, CVE-2021-40700, CVE-2021-40703, CVE-2021-40702)

Adobe Photoshop?Elements

  • Out-of-bounds Write, which could allow for Arbitrary code execution. (CVE-2021-39825)

Creative Cloud Desktop Application

  • Creation of Temporary File in Directory with Incorrect Permissions, which could allow for Arbitrary file system write. (CVE-2021-28613)

Adobe ColdFusion

  • Use of Inherently Dangerous Function which could allow for Security feature bypass?. (CVE-2021-40698)
  • Improper Access Control which could allow for Security feature bypass. (CVE-2021-40699)

Adobe Framemaker

  • Use After Free, which could allow for Arbitrary file system read. (CVE-2021-39835, CVE-2021-39833, CVE-2021-39834)
  • Out-of-bounds Read, which could allow for Arbitrary file system read. (CVE-2021-40697)
  • Access of Memory Location After End of Buffer, which could allow for Arbitrary code execution. (CVE-2021-39832, CVE-2021-39830)
  • Out-of-bounds Write, which could allow for Arbitrary code execution. (CVE-2021-39829, CVE-2021-39831)

Adobe InDesign

  • Access of Memory Location After End of Buffer, which could allow for Arbitrary code execution. (CVE-2021-39820)
  • Out-of-bounds Read, which could allow for Arbitrary code execution. (CVE-2021-39821, CVE-2021-39822)

Adobe SVG-Native-Viewer

  • Heap-based Buffer Overflow, which could allow for Arbitrary code execution. (CVE-2021-39823)

Adobe InCopy

  • Access of Memory Location After End of Buffer, which could allow for Arbitrary file system write. (CVE-2021-39819)
  • Access of Memory Location After End of Buffer, which could allow for Arbitrary code execution. (CVE-2021-39818)

Adobe Premiere Pro

  • Access of Memory Location After End of Buffer, which could allow for Arbitrary Code Execution. (CVE-2021-40710, CVE-2021-40715)

Adobe Acrobat and Reader

  • Type Confusion, which could allow for Arbitrary code execution. (CVE-2021-39841)
  • Heap-based Buffer Overflow, which could allow for Arbitrary code execution. (CVE-2021-39863)
  • Information Exposure, which could allow for Arbitrary file system read. (CVE-2021-39857, CVE-2021-39856, CVE-2021-39855)
  • Out-of-bounds Read, which could allow for a Memory leak. (CVE-2021-39844, CVE-2021-39861)
  • Out-of-bounds Read, which could allow for Arbitrary file system read. (CVE-2021-39858)
  • Out-of-bounds Write, which could allow for a Memory leak. (CVE-2021-39843)
  • Stack-based Buffer Overflow, which could allow for Arbitrary code execution. (CVE-2021-39846, CVE-2021-39845)
  • Uncontrolled Search Path Element, which could allow for Arbitrary code execution. (CVE-2021-35982)
  • Use After Free, which could allow for Arbitrary code execution. (CVE-2021-39859, CVE-2021-39840, CVE-2021-39842, CVE-2021-39839, CVE-2021-39838, CVE-2021-39837, CVE-2021-39836)
  • NULL Pointer Dereference, which could allow for a Memory leak. (CVE-2021-39860)
  • NULL Pointer Dereference, which could allow for Application denial-of-service. (CVE-2021-39852, CVE-2021-39854, CVE-2021-39853, CVE-2021-39850, CVE-2021-39849, CVE-2021-39851)

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

RECOMMENDATIONS:

We recommend the following actions be taken:

  • Install the updates provided by Adobe immediately after appropriate testing.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
  • Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources.
  • Apply the Principle of Least Privilege to all systems and services.

REFERENCES:
Adobe:

https://helpx.adobe.com/security.html
https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html
https://helpx.adobe.com/security/products/photoshop/apsb21-84.html
https://helpx.adobe.com/security/products/experience-manager/apsb21-82.html
https://helpx.adobe.com/security/products/integrity_service/apsb21-81.html
https://helpx.adobe.com/security/products/Digital-Editions/apsb21-80.html
https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html
https://helpx.adobe.com/security/products/photoshop_elements/apsb21-77.html
https://helpx.adobe.com/security/products/creative-cloud/apsb21-76.html
https://helpx.adobe.com/security/products/coldfusion/apsb21-75.html
https://helpx.adobe.com/security/products/framemaker/apsb21-74.html
https://helpx.adobe.com/security/products/indesign/apsb21-73.html
https://helpx.adobe.com/security/products/svg-native-viewer/apsb21-72.html
https://helpx.adobe.com/security/products/incopy/apsb21-71.html
https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html

CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40716

Recent Posts

Mozilla Products Could Allow for Arbitrary Code Execution

Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web...

Apple Products Could Allow for Arbitrary Code Execution

Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. macOS Ventura is the 19th and current major release of macOS iOS is a mobile operating system for mobile devices, including the iPhone,...

Citrix ADC and Gateway Could Allow for Authentication Bypass

Multiple vulnerabilities have been discovered in Citrix ADC and Gateway, the most severe of which could allow for Authentication Bypass. Citrix ADC and Gateway is an Application Delivery Controller and a gateway service to products respectively. Successful...