-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.0531
       APSB22-09 : Security update available for Adobe After Effects
                              9 February 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Adobe After Effects
Publisher:         Adobe
Operating System:  Windows
                   macOS
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-23200 CVE-2021-44195 CVE-2021-44194
                   CVE-2021-44193 CVE-2021-44192 CVE-2021-44191
                   CVE-2021-44190 CVE-2021-44188 

Original Bulletin: 
   https://helpx.adobe.com/security/products/after_effects/apsb22-09.html

Comment: CVSS (Max):  7.8 CVE-2022-23200 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: Adobe

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Updates Available for Adobe After Effects | APSB22-09

Bulletin ID                  Date Published                 Priority

ASPB22-09                February 8, 2022                    3


Summary

Adobe has released an update for Adobe After Effects for Windows and macOS.
This update addresses a critical security vulnerability. Successful
exploitation could lead to arbitrary code execution in the context of the
current user.

Affected Versions

Product                      Version                    Platform

Adobe After Effects     22.1.1 and earlier versions       Windows and macOS

Adobe After Effects     18.4.3 and earlier versions       Windows and macOS


Solution

Adobe categorizes these updates with the following priority ratings and
recommends users update their installation to the newest version via the
Creative Cloud desktop app's update mechanism. For more information, please
reference this help page .

Product        Version      Platform      Priority Rating  Availability

Adobe After Effects  22.2    Windows and macOS  3               Download Center

Adobe After Effects  18.4.4  Windows and macOS  3               Download Center


For managed environments, IT administrators can use the Admin Console to deploy
Creative Cloud applications to end users. Refer to this help page for more
information.

Vulnerability details

Vulnerability  Vulnerability           CVSS
   Category       Impact     Severity  base      CVSS vector      CVE Numbers
                                      score

Out-of-bounds  Arbitrary                     CVSS:3.0/AV:L/AC:L/
Write          code          Critical 7.8    PR:N/UI:R/S:U/C:H/  CVE-2022-23200
(CWE-787)      execution                     I:H/A:H


Acknowledgements

Adobe would like to thank the following researchers for reporting these issues
and for working with Adobe to help protect our customers:

  o Mat Powell of Trend Micro Zero Day Initiative - CVE-2022-23200

Revisions:

December 17, 2021: CVSS Base Scores updated for CVE-2021-44190, CVE-2021-44191,
CVE-2021-44192, CVE-2021-44193, CVE-2021-44194, CVE-2021-44195, CVE-2021-44188

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Dr1M
-----END PGP SIGNATURE-----