Adobe After Effects <= 17.1.1 Multiple Arbitrary Code Execution Vulnerabilities (APSB20-62)

high Nessus Plugin ID 141834

Synopsis

The remote host has an application installed that is affected by an arbitrary code execution vulnerability.

Description

The version of Adobe After Effects installed on the remote Windows host is prior or equal to 17.1.1. It is, therefore, affected by multiple vulnerabilities.

- An out-of-bounds read vulnerability exists when parsing a crafted .aepx file, which could result in a read past the end of an allocated memory structure. An unauthenticated, local attacker could exploit this to execute code in the context of the current user. This vulnerability requires user interaction to exploit.
(CVE-2020-24418)

- An uncontrolled search path vulnerability exists. An unauthenticated, local attacker can exploit this to to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Adobe After Effects version 17.1.3 or later.

See Also

https://helpx.adobe.com/security/products/after_effects/apsb20-62.html

Plugin Details

Severity: High

ID: 141834

File Name: adobe_after_effects_apsb20-62.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 10/23/2020

Updated: 2/14/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-24418

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2020-24419

Vulnerability Information

CPE: cpe:/a:adobe:after_effects

Required KB Items: SMB/Registry/Enumerated, installed_sw/Adobe After Effects

Exploit Ease: No known exploits are available

Patch Publication Date: 10/20/2020

Vulnerability Publication Date: 10/20/2020

Reference Information

CVE: CVE-2020-24418, CVE-2020-24419

IAVA: 2020-A-0489-S