-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.3083
      APSB21-78 Security update available for Adobe Premiere Elements
                             15 September 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Adobe Premiere Elements
Publisher:         Adobe
Operating System:  Windows
                   Mac OS
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-40703 CVE-2021-40702 CVE-2021-40701
                   CVE-2021-40700 CVE-2021-39824 

Original Bulletin: 
   https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Security updates available for Adobe Premiere Elements | APSB21-78

Bulletin ID                  Date Published                 Priority

ASPB21-78               September 14, 2021                    3


Summary

Adobe has released updates for Adobe Premiere Elements for Windows and macOS.
This update addresses one important and multiple critical vulnerabilities.
Successful exploitation could lead to arbitrary code execution in the context
of the current user.

Affected Versions

Product                         Version                       Platform

Adobe Premiere      2021 [build 19.0 (20210127.daily.2235820)    Windows and
Elements            and earlier]                                 macOS


Solution

Adobe categorizes these updates with the following priority ratings and
recommends users to download the new installer and upgrade their installations.

Product                Version             Platform   Priority Availability

Adobe Premiere   2021 [build 19.0             Windows and 3        Download
Elements         (20210809.daily.2242976)]    macOS                Center

Note:

To verify the version of Premiere Elements on your system, please follow the
following steps:

  o Help
  o About Premiere Elements menu
  o The splash screen would show the current version and build number.

Vulnerability details

  Vulnerability   Vulnerability           CVSS
    Category         Impact     Severity  base    CVSS vector     CVE Numbers
                                          score

Access of Memory
Location After    Arbitrary                     CVSS:3.1/AV:N/
End of Buffer     code          Critical  8.8   AC:L/PR:N/UI:R/  CVE-2021-39824
                  execution                     S:U/C:H/I:H/A:H
( CWE-788 )

Access of Memory
Location After    Arbitrary                     CVSS:3.1/AV:L/
End of Buffer     code          Important 5.5   AC:L/PR:N/UI:R/  CVE-2021-40701
                  execution                     S:U/C:N/I:N/A:H
( CWE-788 )

Access of Memory                                                 CVE-2021-40700
Location After    Arbitrary                     CVSS:3.1/AV:L/
End of Buffer     code          Critical  7.8   AC:L/PR:N/UI:R/  CVE-2021-40703
                  execution                     S:U/C:H/I:H/A:H
( CWE-788 )                                                      CVE-2021-40702


Acknowledgments

Adobe would like to thank the following for reporting these issues and for
working with Adobe to help protect our customers:

  o CQY of Topsec Alpha Team (yjdfy) (CVE-2021-40700, CVE-2021-39824,
    CVE-2021-40702)
  o CFF of Topsec Alpha Team (cff_123) (CVE-2021-40703, CVE-2021-40701)

For more information, visit https://helpx.adobe.com/security.html , or email
PSIRT@adobe.com.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYUFKU+NLKJtyKPYoAQgmjw//ZGQwUcCdMIsmHFTe8yRRIzyBTdQQsfkE
6lMTgDqUhFerC47uHHnNT1AMR4DjfjB4L+rxkA79JNkuo82KQkIZbSrlDrAnsMNd
oD6V+seXoh3EOHFXrbT05aJXDbVesZtn1lBgLEuKyUNxUBaNz7ZLIRc2b7SgOBSE
ZPlB5RDrYTpyyZmMrNLOv+IvAmW/I5tjTcrRwqxkqAQVs4kdhis1rJgOvDK+NRqh
hwvHXLsH7iJngBcwA3LNJexxakuN3sWDlViYl2PXy0J5qLZdgMExSnyL+2Ay4cZ9
e4BpKXAZ7wHq6MrFo3uIv3+gCATwBDXFSgdBpf8lpAE5hr3gOcgQZGRHujUX5/j+
MvFlEp5Lpm9Fw+kojMguZV2yEQTECcLXFn3tU7egXEAyfOLeWj4Lg2dv7L2iQdZk
DMJLTTlkWPi/EnWHv7noT7+XeRoSUfOSio2HeLgfWt2V/jgN3tuYDwFm31yrJj0R
injGnGkRcqB6AF5GrYsiK2pld4aCZXh1FYWbHyDJuwf3lPdsfaSMD8x9i2+o4SOj
69d2QJ7G3BZEUfAH+s8cSkEX43RtkAYLAnpPlMLaoC06t8u0NawvePTivTR52U/F
7bC7ZwUbjuh5vbyC7sF5YCx4M53bhMjudKg9a/0ES4lusWdsoI0lNAjQJ+AGjwiG
Eu9WNRxmheE=
=6hwX
-----END PGP SIGNATURE-----