First published: Mon Dec 20 2021(Updated: )
Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Dimension | ||
All of | ||
Adobe Dimension | <=3.4.3 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows | ||
Adobe Dimension | <=3.4.3 | |
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44183 is considered a medium severity vulnerability due to its potential to disclose sensitive memory information.
To remediate CVE-2021-44183, update Adobe Dimension to version 3.4.4 or later where the vulnerability has been patched.
Users of Adobe Dimension versions 3.4.3 and earlier are affected by CVE-2021-44183.
Exploitation of CVE-2021-44183 could lead to the disclosure of sensitive data from memory, allowing an attacker to bypass mitigations like ASLR.
Yes, the exploitation of CVE-2021-44183 requires user interaction.