-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0450
         APSB21-13 Security update available for Adobe Dreamweaver
                             10 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Adobe Dreamweaver
Publisher:         Adobe
Operating System:  Windows
                   Mac OS
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-21055  

Original Bulletin: 
   https://helpx.adobe.com/security/products/dreamweaver/apsb21-13.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Security update available for Adobe Dreamweaver | APSB21-13
+-----------------------+-----------------------------------+-----------------+
|Bulletin ID            |Date Published                     |Priority         |
+-----------------------+-----------------------------------+-----------------+
|APSB21-13              |February 09, 2021                  |3                |
+-----------------------+-----------------------------------+-----------------+

Summary

Adobe has released a security update for Adobe Dreamweaver. This update
resolves a vulnerability rated important . Successful exploitation could lead
to sensitive information disclosure in the context of the current user.

Affected Versions

+----------------------+----------------------+----------------------+
|       Product        |  Affected Versions   |       Platform       |
+----------------------+----------------------+----------------------+
|Adobe Dreamweaver     |20.2                  |Windows and macOS     |
+----------------------+----------------------+----------------------+
|Adobe Dreamweaver     |21.0                  |Windows and macOS     |
+----------------------+----------------------+----------------------+

Solution

Adobe categorizes this update with the following priority rating and recommends
users to use latest builds for new installation via the Creative Cloud desktop
app updater, or by navigating to the Dreamweaver Help menu and clicking
"Updates." For more information, please reference this help page .

+--------------------+-----------------+--------------------+-----------------+
|      Product       | Updated Version |      Platform      | Priority rating |
+--------------------+-----------------+--------------------+-----------------+
|Adobe Dreamweaver   |20.2.1           |Windows and macOS   |3                |
+--------------------+-----------------+--------------------+-----------------+
|Adobe Dreamweaver   |21.1             |Windows and macOS   |3                |
+--------------------+-----------------+--------------------+-----------------+

Note:

Note: For managed environments, IT administrators can use the Creative Cloud
Packager to create deployment packages. Refer to this help page for more
information on the Creative Cloud Packager.

Vulnerability Details

+-------------------------+------------------+---------+----------------------+
| Vulnerability Category  |  Vulnerability   |Severity |     CVE Numbers      |
|                         |      Impact      |         |                      |
+-------------------------+------------------+---------+----------------------+
|Uncontrolled Search Path |Information       |Important|CVE-2021-21055        |
|Element                  |disclosure        |         |                      |
+-------------------------+------------------+---------+----------------------+

Acknowledgements

Adobe would like to thank Xavier DANEST from Decathlon for reporting these
issues and working with Adobe to help protect our customers.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYCMq3ONLKJtyKPYoAQilSBAAjVme/wun7FNK2kyb40zLceKIrriyVfHy
7tWE3OT0dNrmzJi/2dvQoTwKXH2onGbxyI11so9neVoKgM4ShNsQmLzDDIT+Ks1G
fSOE1xtuyiRncg6G86LYruc7D9dW7BWkO4jWQLMlW+icYJ4+5rdD4bD4m6DcrOjO
PhlqdbrPiaNbThBT/2DJes7ryAN8I+cgI1VLYNVrw7pv/G1Fn8lnhi3D5nzFYwBH
xilEwshvAY/7vON1Ag6Eq3zwFMq9KMI8yECB9K+hn2uinC7dlThjCp5/6CfqvWUT
TmUUIvusXag9MIkQe7STU/v2UCRPg3g3i60AB92MyUlqInYEs4myu41T/XFXv50p
Xy9N+fTnFsvuOODJOb6iEKWMwUstcfis9fub4vY1dxJsaIM8DMk9YUEgMUGsKjzb
1uuAtNClYEJ50WRbdkFPZtUFbViLq/jf6Xk6BV17He20GnjZRpgdAWb5nw3heWT3
1aBVcX+XJUK3LvgEUvmSg7dqAFhCQ5eUPjeLDJt0uqghQ7ltRMlQ4fJWWheLNsHw
3VMBboIxZjolWY/r9esbwGWUHaCpFMSGy+azlMuR7cCfEmBZ+koUI3pv0k/Y/fTg
3me+DqbovJkE+CxmBbb9six0l1nOW906jlm98dHDXbsOxL9z9xKTESBQRpJTKHsj
vMqDxNNpL6w=
=eYmd
-----END PGP SIGNATURE-----