{"id":18253,"date":"2022-02-10T11:40:02","date_gmt":"2022-02-10T19:40:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/10\/news-11986\/"},"modified":"2022-02-10T11:40:02","modified_gmt":"2022-02-10T19:40:02","slug":"news-11986","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/10\/news-11986\/","title":{"rendered":"Fortinet Security Researchers Discover Multiple Vulnerabilities in Adobe Illustrator &amp; Photoshop"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p><b>Affected platforms:<\/b>\u00a0Windows and MacOS <\/p>\n<p><b>Impacted parties:<\/b>\u00a0Users of Adobe Illustrator 2022, versions 26.0.2\u202fand\u202fearlier<\/p>\n<p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Users of Adobe Illustrator 2021, versions 25.4.3\u202fand\u202fearlier<\/p>\n<p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Users of Adobe Photoshop 2022, versions 23.1 and earlier<\/p>\n<p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Users of Adobe Photoshop 2021, versions 22.5.4 and earlier<\/p>\n<p><b>Impact:<\/b>\u00a0 Multiple Vulnerabilities leading to Arbitrary Code Execution or Information Disclosure.<\/p>\n<p><b>Severity level:<\/b>\u00a0Critical &amp; Important<\/p>\n<p>Towards the end of 2021, Fortinet security researchers Kushal Arvind Shah and Yonghui Han discovered and reported numerous zero-day vulnerabilities in Adobe Illustrator &amp; Photoshop. This Patch Tuesday (dated Feb 08, 2022), Adobe released several security patches (<a href=\"https:\/\/helpx.adobe.com\/security\/products\/illustrator\/apsb22-07.html\" target=\"_blank\">1<\/a> and <a href=\"https:\/\/helpx.adobe.com\/security\/products\/photoshop\/apsb22-08.html\" target=\"_blank\">2<\/a>) which fixed 14 of them. These vulnerabilities are identified as CVE-2022-23186, CVE-2022-23188, CVE-2022-23189, CVE-2022-23190, CVE-2022-23191, CVE-2022-23192, CVE-2022-23193, CVE-2022-23194, CVE-2022-23195, CVE-2022-23196, CVE-2022-23197, CVE-2022-23198, CVE-2022-23199, and CVE-2022-23203. All of these vulnerabilities have different root causes pertaining to a multitude of Illustrator &amp; Photoshop Plugins. Due to the severity of these vulnerabilities, we suggest users apply the Adobe patches as soon as possible.<\/p>\n<p>Following are some details on these vulnerabilities. More information can be found on the related Fortinet Zero Day Advisory pages by clicking on the CVE links, below:<\/p>\n<h3><a href=\"https:\/\/www.fortiguard.com\/zeroday\/FG-VD-21-072\">CVE-2022-23186<\/a><\/h3>\n<p>This is an Arbitrary Code Execution vulnerability that exists in the decoding of CorelDraw Drawing (CDR) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed CDR file, which causes an Out of Bounds Write memory access due to an improper bounds check.\u00a0<\/p>\n<p>A remote attacker may be able to exploit this vulnerability to execute arbitrary code within the context of the application via a crafted CDR file.<\/p>\n<p>Fortinet released\u00a0<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a>\u00a0signature\u00a0<b>Adobe.Illustrator.CVE-2022-23186.Arbitrary.Code.Execution<\/b>\u00a0for this specific vulnerability to proactively\u00a0protect our customers.<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-093\">CVE-2022-23188<\/a><b><\/b><\/h3>\n<p>This is a Buffer Overflow vulnerability in the Adobe Illustrator \u2018MPS\u2019 plugin. Specifically, the vulnerability is caused by a malformed Macintosh Picture Image file (PCT) file, which causes an Out of Bounds Write memory access due to improper bounds check when manipulating a pointer to an allocated buffer.<\/p>\n<p>A remote attacker may be able to exploit this vulnerability to execute arbitrary code within the context of the application via a crafted PCT file.<\/p>\n<p>Fortinet released <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a> signature <b>Adobe.Illustrator.CVE-2022-23188.Buffer.Overflow for <\/b>this specific vulnerability to proactively\u00a0protect our customers.<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-083\">CVE-2022-23189<\/a><\/h3>\n<p>This is a Null-Pointer Dereference vulnerability that exists in the decoding of AutoCAD Drawing (DWG) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed DWG file, which causes a NULL pointer dereference.\u00a0<\/p>\n<p>Attackers can exploit this vulnerability with a crafted DWG file, potentially leading to an application denial-of-service.<\/p>\n<p>Fortinet released\u00a0<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a>\u00a0signature\u00a0<b>Adobe.Illustrator.CVE-2022-23189.Null.Pointer.Dereference <\/b>for this specific vulnerability to proactively\u00a0protect our customers.<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-097\">CVE-2022-23190<\/a><b><\/b><\/h3>\n<p>This is a Memory Corruption vulnerability that exists in the decoding of Computer Graphics Metafile (CGM) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed CGM file, which causes an Out of Bounds Read memory access due to an improper bounds check. The specific vulnerability exists in the \u2018Reader_for_CGM\u2019 plugin.<\/p>\n<p>Attackers can exploit this vulnerability for unintended memory reads, potentially leading to a memory data leak via a crafted CGM file.<\/p>\n<p>Fortinet released <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a> signature <b>Adobe.Illustrator.CVE-2022-23190.Memory.Corruption<\/b> for this specific vulnerability to proactively protect our customers.<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-098\">CVE-2022-23191<\/a><b><\/b><\/h3>\n<p>This is a Memory Corruption vulnerability that exists in the decoding of Macintosh Picture Image file (PCT) in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed PCT file, which causes an Out of Bounds Read memory access due to an improper bounds check. The specific vulnerability exists in the \u2018MPS\u2019 plugin.<\/p>\n<p>Attackers can exploit this vulnerability for unintended memory reads, potentially leading to a memory data leak via a crafted PCT file.<\/p>\n<p>Fortinet released <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a> signature <b>Adobe.Illustrator.CVE-2022-23191.Memory.Corruption<\/b> for this specific vulnerability to proactively protect our customers.<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-094\">CVE-2022-23192<\/a><b><\/b><\/h3>\n<p>This is a Memory Corruption vulnerability existing in the decoding of Adobe Illustrator Artwork (AI) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed AI file, which causes an Out of Bounds memory access due to an improper bounds check.<\/p>\n<p>Attackers can exploit this vulnerability for unintended memory reads, potentially leading to a memory data leak via a crafted AI file.<\/p>\n<p>Fortinet released <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a> signature <b>Adobe.Illustrator.CVE-2022-23192.Memory.Corruption for <\/b>this specific vulnerability to proactively\u00a0protect our customers.<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-099\">CVE-2022-23193<\/a><b><\/b><\/h3>\n<p>This is a Memory Corruption vulnerability existing in the decoding of Portable Document Format (PDF) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed PDF file, which causes an Out of Bounds memory access, due to improper bounds check.<\/p>\n<p>Attackers can exploit this vulnerability for unintended memory reads, potentially leading to a memory data leak, via a crafted PDF file.<\/p>\n<p>Fortinet released <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a> signature <b>Adobe.Illustrator.CVE-2022-23193.Memory.Corruption for <\/b>this specific vulnerability to proactively\u00a0protect our customers.<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-096\">CVE-2022-23194<\/a><b><\/b><\/h3>\n<p>This is a Memory Corruption vulnerability that exists in the decoding of Computer Graphics Metafile (CGM) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed CGM file, which causes an Out of Bounds Read memory access due to an improper bounds check. The specific vulnerability exists in the \u2018Reader_for_CGM\u2019 plugin.<\/p>\n<p>Attackers can exploit this vulnerability for unintended memory reads, potentially leading to a memory data leak via a crafted CGM file.<\/p>\n<p>Fortinet released <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a> signature <b>Adobe.Illustrator.CVE-2022-23194.Memory.Corruption<\/b> for this specific vulnerability to proactively protect our customers.<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-095\">CVE-2022-23195<\/a><b><\/b><\/h3>\n<p>This is a Memory Corruption vulnerability that exists in the decoding of Computer Graphics Metafile (CGM) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed CGM file, which causes an Out of Bounds Read memory access due to an improper bounds check. The specific vulnerability exists in the \u2018Reader_for_CGM\u2019 plugin.<\/p>\n<p>Attackers can exploit this vulnerability for unintended memory reads, potentially leading to a memory data leak via a crafted CGM file.<\/p>\n<p>Fortinet released <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a> signature <b>Adobe.Illustrator.CVE-2022-23195.Memory.Corruption<\/b> for this specific vulnerability to proactively protect our customers.<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-075\">CVE-2022-23196<\/a><\/h3>\n<p>This is a Memory Leak vulnerability that exists in the decoding of CorelDraw Drawing (CDR) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed CDR file, which causes an Out of Bounds memory access due to an improper bounds check.\u00a0<\/p>\n<p>Attackers can exploit this vulnerability for unintended memory reads, potentially leading to a memory data leak via a crafted CDR file.<\/p>\n<p>Fortinet released\u00a0<a href=\"https:\/\/www.fortinet.com\/products\/ips.html?utm_source=blog&amp;utm_campaign=ips\">IPS<\/a>\u00a0signature\u00a0<b>Adobe.Illustrator.CVE-2022-23196.Memory.Leak<\/b>\u00a0for this specific vulnerability to proactively\u00a0protect our customers.<\/p>\n<h3><a href=\"https:\/\/www.fortiguard.com\/zeroday\/FG-VD-21-070\">CVE-2022-23197<\/a><\/h3>\n<p>This is a Memory Leak vulnerability that exists in the decoding of CorelDraw Drawing (CDR) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed CDR file, which causes an Out of Bounds memory access due to an improper bounds check.\u00a0<\/p>\n<p>Attackers can exploit this vulnerability for unintended memory reads, potentially leading to a memory data leak via a crafted CDR file.<\/p>\n<p>Fortinet released\u00a0<a href=\"https:\/\/www.fortinet.com\/products\/ips.html?utm_source=blog&amp;utm_campaign=ips\">IPS<\/a>\u00a0signature\u00a0<b>Adobe.Illustrator.CVE-2022-23197.Memory.Leak<\/b>\u00a0for this specific vulnerability to proactively\u00a0protect our customers.<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-074\">CVE-2022-23198<\/a><\/h3>\n<p>This is a Null-Pointer Dereference vulnerability that exists in the decoding of CorelDraw Drawing (CDR) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed CDR file, which causes a NULL pointer dereference.\u00a0<\/p>\n<p>Attackers can exploit this vulnerability with a crafted CDR file, potentially leading to an application denial-of-service.<\/p>\n<p>Fortinet released\u00a0<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a>\u00a0signature\u00a0<b>Adobe.Illustrator.CVE-2022-23198.Null.Pointer.Dereference<\/b>\u00a0for this specific vulnerability to proactively\u00a0protect our customers<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-073\">CVE-2022-23199<\/a><\/h3>\n<p>This is a Null-Pointer Dereference vulnerability that exists in the decoding of CorelDraw Drawing (CDR) files in Adobe Illustrator. Specifically, the vulnerability is caused by a malformed CDR file, which causes a NULL pointer dereference.\u00a0<\/p>\n<p>Attackers can exploit this vulnerability with a crafted CDR file, potentially leading to an application denial-of-service.<\/p>\n<p>Fortinet released\u00a0<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a>\u00a0signature\u00a0<b>Adobe.Illustrator.CVE-2022-23199.NULL.Pointer.Dereference<\/b>\u00a0for this specific vulnerability to proactively\u00a0protect our customers<\/p>\n<h3><a href=\"https:\/\/fortiguard.com\/zeroday\/FG-VD-21-101\">CVE-2022-23203<\/a><b><\/b><\/h3>\n<p>This is a Buffer Overflow vulnerability existing in the decoding of Universal 3D (U3D) files in Adobe Photoshop. Specifically, the vulnerability is caused by a malformed U3D file, which causes an Out of Bounds memory access due to improper bounds check. The specific vulnerability exists in the \u2018U3D\u2019 plugin.<\/p>\n<p>A remote attacker may be able to exploit this vulnerability to execute arbitrary code within the context of the application via a crafted U3D file.<\/p>\n<p>Fortinet released <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-an-ips?utm_source=blog&amp;utm_campaign=what-is-an-ips\">IPS<\/a> signature <b>Adobe.Photoshop.CVE-2022-23203.Arbitrary.Code.Execution<\/b> for this specific vulnerability to proactively protect our customers.<\/p>\n<p><i>Learn more about Fortinet\u2019s <a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?utm_source=blog&amp;utm_campaign=fortiguard-labs\">FortiGuard Labs<\/a> threat research and intelligence organization and the FortiGuard Security Subscriptions and Services <a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?tab=security-bundles&amp;utm_source=blog&amp;utm_campaign=security-bundles\">portfolio<\/a>.<\/i><\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<div id=\"om-qbkzwxxbiv83f0ol5a2d-holder\"><\/div>\n<\/div><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/fortinet-security-researchers-discover-vulnerabilities-adobe-illustrator-photoshop\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fortinet security researchers discovered and reported zero-day vulnerabilities in Adobe Illustrator &amp; Photoshop. This Patch Tuesday Adobe released several security patches and fixes. Read more.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-18253","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18253"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18253\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18253"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}