First published: Fri Nov 17 2023(Updated: )
Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe After Effects | >=23.0<=23.6 | |
Adobe After Effects | >=24.0<24.0.2 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-47069.
The title of the vulnerability is ZDI-CAN-21703: Adobe After Effects M4A File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability.
The vulnerability affects Adobe After Effects version 24.0.2 (and earlier) and 23.6 (and earlier).
The vulnerability occurs when parsing a crafted file, which could result in a read past the end of an allocated memory structure.
The severity of the vulnerability is high with a CVSS score of 7.8.
An attacker could leverage this vulnerability to execute code in the context of the affected application.
No, Apple macOS and Microsoft Windows are not vulnerable to this specific vulnerability.
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-125.
You can find more information about this vulnerability on Adobe's security advisory page at https://helpx.adobe.com/security/products/after_effects/apsb23-66.html.