Bulletin ID
Security Updates Available for Adobe Premiere Rush | APSB21-101
|
Date Published |
Priority |
---|---|---|
ASPB21-101 |
December 14, 2021 |
3 |
Summary
Affected Versions
Product |
Version |
Platform |
---|---|---|
Adobe Premiere Rush |
1.5.16 and earlier versions |
Windows |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version via the Creative Cloud desktop app’s update mechanism. For more information, please reference this help page.
Product |
Version |
Platform |
Priority Rating |
Availability |
---|---|---|---|---|
Adobe Premiere Rush |
2.0 |
Windows and macOS |
3 |
For managed environments, IT administrators can use the Admin Console to deploy Creative Cloud applications to end users. Refer to this help page for more information.
Vulnerability details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVE Numbers |
---|---|---|---|
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary Code Execution |
Critical |
CVE-2021-40783 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary Code Execution |
Critical |
CVE-2021-40784 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
CVE-2021-43021 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
CVE-2021-43022 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
CVE-2021-43023 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
CVE-2021-43024 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
CVE-2021-43025 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
CVE-2021-43026 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
CVE-2021-43028 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
CVE-2021-43029 |
Access of Uninitialized Pointer (CWE-824) |
Privilege escalation |
Important |
CVE-2021-43030 |
Access of Uninitialized Pointer (CWE-824) |
Memory Leak |
Important |
CVE-2021-43746 |
Access of Memory Location After End of Buffer (CWE-788) |
Arbitrary code execution |
Critical |
CVE-2021-43747 |
NULL Pointer Dereference (CWE-476) |
Application denial-of-service |
Important |
CVE-2021-43748 |
NULL Pointer Dereference (CWE-476) |
Application denial-of-service |
Important |
CVE-2021-43749 |
NULL Pointer Dereference (CWE-476) |
Application denial-of-service |
Important |
CVE-2021-43750 |
Acknowledgments
Adobe would like to thank the following for reporting these issues and for working with Adobe to help protect our customers:
(hy350) HY350 of Topsec Alpha Team- CVE-2021-43750, CVE-2021-43749, CVE-2021-43748,
(yjdfy) CQY of Topsec Alpha Team- CVE-2021-43747, CVE-2021-43029, CVE-2021-43028, CVE-2021-43026, CVE-2021-43025, CVE-2021-43023, CVE-2021-43022, CVE-2021-43021,
- (cff_123) CFF of Topsec Alpha Team- CVE-2021-43024, CVE-2021-40784, CVE-2021-40783
- Mat Powell of Trend Micro Zero Day Initiative - CVE-2021-43746, CVE-2021-43030