Hash: SHA256

             AUSCERT External Security Bulletin Redistribution

      APSB21-78 Security update available for Adobe Premiere Elements
                             15 September 2021


        AusCERT Security Bulletin Summary

Product:           Adobe Premiere Elements
Publisher:         Adobe
Operating System:  Windows
                   Mac OS
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-40703 CVE-2021-40702 CVE-2021-40701
                   CVE-2021-40700 CVE-2021-39824 

Original Bulletin: 

- --------------------------BEGIN INCLUDED TEXT--------------------

Security updates available for Adobe Premiere Elements | APSB21-78

Bulletin ID                  Date Published                 Priority

ASPB21-78               September 14, 2021                    3


Adobe has released updates for Adobe Premiere Elements for Windows and macOS.
This update addresses one important and multiple critical vulnerabilities.
Successful exploitation could lead to arbitrary code execution in the context
of the current user.

Affected Versions

Product                         Version                       Platform

Adobe Premiere      2021 [build 19.0 (20210127.daily.2235820)    Windows and
Elements            and earlier]                                 macOS


Adobe categorizes these updates with the following priority ratings and
recommends users to download the new installer and upgrade their installations.

Product                Version             Platform   Priority Availability

Adobe Premiere   2021 [build 19.0             Windows and 3        Download
Elements         (20210809.daily.2242976)]    macOS                Center


To verify the version of Premiere Elements on your system, please follow the
following steps:

  o Help
  o About Premiere Elements menu
  o The splash screen would show the current version and build number.

Vulnerability details

  Vulnerability   Vulnerability           CVSS
    Category         Impact     Severity  base    CVSS vector     CVE Numbers

Access of Memory
Location After    Arbitrary                     CVSS:3.1/AV:N/
End of Buffer     code          Critical  8.8   AC:L/PR:N/UI:R/  CVE-2021-39824
                  execution                     S:U/C:H/I:H/A:H
( CWE-788 )

Access of Memory
Location After    Arbitrary                     CVSS:3.1/AV:L/
End of Buffer     code          Important 5.5   AC:L/PR:N/UI:R/  CVE-2021-40701
                  execution                     S:U/C:N/I:N/A:H
( CWE-788 )

Access of Memory                                                 CVE-2021-40700
Location After    Arbitrary                     CVSS:3.1/AV:L/
End of Buffer     code          Critical  7.8   AC:L/PR:N/UI:R/  CVE-2021-40703
                  execution                     S:U/C:H/I:H/A:H
( CWE-788 )                                                      CVE-2021-40702


Adobe would like to thank the following for reporting these issues and for
working with Adobe to help protect our customers:

  o CQY of Topsec Alpha Team (yjdfy) (CVE-2021-40700, CVE-2021-39824,
  o CFF of Topsec Alpha Team (cff_123) (CVE-2021-40703, CVE-2021-40701)

For more information, visit https://helpx.adobe.com/security.html , or email

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967