copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2011.0992 - [Win] Adobe Photoshop Elements 8.0: Execute arbitrary code/commands - Remote with user interaction

Date: 03 October 2011

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2011.0992
       Critical vulnerabilities exist in Adobe Photoshop Elements 8
                              3 October 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Adobe Photoshop Elements 8.0
Publisher:         Adobe
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Alternate Program
CVE Names:         CVE-2011-2443  

Original Bulletin: 
   http://www.adobe.com/support/security/advisories/apsa11-03.html

Comment: Photoshop Elements 8 is no longer supported, users should upgrade to
         version 10 or not open .grd or .abr files from untrusted sources.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Advisory for Adobe Photoshop Elements 8

   Release date: September 30, 2011

   Vulnerability identifier: APSA11-03

   CVE number: CVE-2011-2443

   Platform: Windows

Summary

   Critical vulnerabilities exist in Adobe Photoshop Elements 8.0 and
   earlier versions. These vulnerabilities (CVE-2011-2443) could cause a
   crash and potentially allow an attacker to take control of the affected
   system. An attacker would need to convince a user to open a malicious
   binary .grd or .abr file to successfully exploit the issue. Adobe is
   not aware of any attacks exploiting these vulnerabilities against Adobe
   Photoshop Elements to date. Photoshop Elements 10 and Photoshop
   Elements 9 are not vulnerable to this issue.

Affected software versions

   Adobe Photoshop Elements 8.0 and earlier versions for Windows

Solution

   Because Photoshop Elements 8 is no longer supported, Adobe recommends
   users upgrade to Photoshop Elements 10. Users who cannot upgrade to
   Photoshop Elements 10 should not open .grd or .abr files from untrusted
   sources.

Severity rating

   Adobe categorizes this as a critical issue.

Details

   Critical vulnerabilities exist in Adobe Photoshop Elements 8.0 and
   earlier versions. These two buffer overflow vulnerabilities
   (CVE-2011-2443) could cause a crash and potentially allow an attacker
   to take control of the affected system. An attacker would need to
   convince a user to open a malicious binary .grd or .abr file to
   successfully exploit the issue. Adobe is not aware of any attacks
   exploiting these vulnerabilities against Adobe Photoshop Elements to
   date. Photoshop Elements 10 and Photoshop Elements 9 are not vulnerable
   to this issue. Because Adobe Photoshop 8 and earlier versions are no
   longer supported, Adobe recommends users upgrade to Photoshop Elements
   10 or Photoshop Elements 9.

Acknowledgments

   Adobe would like to thank Gjoko Krstic of Zero Science Lab
   (CVE-2011-2443) [PSIRT ID 447-448] for reporting the relevant issue and
   for working with Adobe to help protect our customers.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=2e7w
-----END PGP SIGNATURE-----