CVE-2021-42269
Vulnerability from cvelistv5
Published
2021-11-18 16:42
Modified
2024-09-17 00:11
Severity ?
EPSS score ?
Summary
Adobe Animate version 21.0.9 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed FLA file that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T03:30:37.853Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://helpx.adobe.com/security/products/animate/apsb21-105.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Animate", vendor: "Adobe", versions: [ { lessThanOrEqual: "21.0.9", status: "affected", version: "unspecified", versionType: "custom", }, { lessThanOrEqual: "None", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2021-10-26T00:00:00", descriptions: [ { lang: "en", value: "Adobe Animate version 21.0.9 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed FLA file that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "Use After Free (CWE-416)", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-18T16:42:00", orgId: "078d4453-3bcd-4900-85e6-15281da43538", shortName: "adobe", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://helpx.adobe.com/security/products/animate/apsb21-105.html", }, ], source: { discovery: "EXTERNAL", }, title: "Adobe Animate FLA File Parsing Use After Free Remote Code Execution", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@adobe.com", DATE_PUBLIC: "2021-10-26T23:00:00.000Z", ID: "CVE-2021-42269", STATE: "PUBLIC", TITLE: "Adobe Animate FLA File Parsing Use After Free Remote Code Execution", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Animate", version: { version_data: [ { version_affected: "<=", version_value: "21.0.9", }, { version_affected: "<=", version_value: "None", }, { version_affected: "<=", version_value: "None", }, { version_affected: "<=", version_value: "None", }, ], }, }, ], }, vendor_name: "Adobe", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Adobe Animate version 21.0.9 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed FLA file that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", }, ], }, impact: { cvss: { attackComplexity: "Low", attackVector: "Local", availabilityImpact: "High", baseScore: 7.8, baseSeverity: "High", confidentialityImpact: "High", integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", userInteraction: "Required", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Use After Free (CWE-416)", }, ], }, ], }, references: { reference_data: [ { name: "https://helpx.adobe.com/security/products/animate/apsb21-105.html", refsource: "MISC", url: "https://helpx.adobe.com/security/products/animate/apsb21-105.html", }, ], }, source: { discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "078d4453-3bcd-4900-85e6-15281da43538", assignerShortName: "adobe", cveId: "CVE-2021-42269", datePublished: "2021-11-18T16:42:00.979534Z", dateReserved: "2021-10-12T00:00:00", dateUpdated: "2024-09-17T00:11:55.890Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"21.0.9\", \"matchCriteriaId\": \"90479E75-7711-4DC6-8C17-962388F831A8\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Adobe Animate version 21.0.9 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed FLA file that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\"}, {\"lang\": \"es\", \"value\": \"Adobe Animate versi\\u00f3n 21.0.9 (y anteriores), est\\u00e1 afectada por una vulnerabilidad de uso de memoria previamente liberada en el procesamiento de un archivo FLA malformado que podr\\u00eda resultar en una ejecuci\\u00f3n de c\\u00f3digo arbitrario en el contexto del usuario actual. Es requerida una interacci\\u00f3n del usuario para la explotaci\\u00f3n de este problema, ya que la v\\u00edctima debe abrir un archivo malicioso.\\n\"}]", id: "CVE-2021-42269", lastModified: "2024-11-21T06:27:29.667", metrics: "{\"cvssMetricV31\": [{\"source\": \"psirt@adobe.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2021-11-18T17:15:12.360", references: "[{\"url\": \"https://helpx.adobe.com/security/products/animate/apsb21-105.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://helpx.adobe.com/security/products/animate/apsb21-105.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", sourceIdentifier: "psirt@adobe.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"psirt@adobe.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2021-42269\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2021-11-18T17:15:12.360\",\"lastModified\":\"2024-11-21T06:27:29.667\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Animate version 21.0.9 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed FLA file that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\"},{\"lang\":\"es\",\"value\":\"Adobe Animate versión 21.0.9 (y anteriores), está afectada por una vulnerabilidad de uso de memoria previamente liberada en el procesamiento de un archivo FLA malformado que podría resultar en una ejecución de código arbitrario en el contexto del usuario actual. Es requerida una interacción del usuario para la explotación de este problema, ya que la víctima debe abrir un archivo malicioso.\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"21.0.9\",\"matchCriteriaId\":\"90479E75-7711-4DC6-8C17-962388F831A8\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/animate/apsb21-105.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/animate/apsb21-105.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.