1+ <definition xmlns =" http://oval.mitre.org/XMLSchema/oval-definitions-5" id =" oval:com.gfi:def:1532"
2+ version =" 0" class =" vulnerability" >
3+ <metadata >
4+ <title >Multiple vulnerabilities on Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1
5+ (and earlier)</title >
6+ <affected family =" windows" >
7+ <platform >Microsoft Windows 8</platform >
8+ <platform >Microsoft Windows 8.1</platform >
9+ <platform >Microsoft Windows 10</platform >
10+ <platform >Microsoft Windows 11</platform >
11+ <platform >Microsoft Windows Server 2012</platform >
12+ <platform >Microsoft Windows Server 2012 R2</platform >
13+ <platform >Microsoft Windows Server 2016</platform >
14+ <platform >Microsoft Windows Server 2019</platform >
15+ <product >Adobe Bridge</product >
16+ </affected >
17+ <reference ref_id =" APSB23-09"
18+ ref_url =" https://helpx.adobe.com/security/products/bridge/apsb23-09.html"
19+ source =" Vendor Advisory" />
20+ <reference ref_id =" CVE-2023-21583"
21+ ref_url =" https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21583" source =" CVE" />
22+ <reference ref_id =" CVE-2023-22226"
23+ ref_url =" https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22226" source =" CVE" />
24+ <reference ref_id =" CVE-2023-22227"
25+ ref_url =" https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22227" source =" CVE" />
26+ <reference ref_id =" CVE-2023-22228"
27+ ref_url =" https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22228" source =" CVE" />
28+ <reference ref_id =" CVE-2023-22229"
29+ ref_url =" https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22229" source =" CVE" />
30+ <reference ref_id =" CVE-2023-22230"
31+ ref_url =" https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22230" source =" CVE" />
32+ <reference ref_id =" CVE-2023-22231"
33+ ref_url =" https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22231" source =" CVE" />
34+ <description >
35+ Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an
36+ out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An
37+ attacker could leverage this vulnerability to bypass mitigations such as ASLR.
38+ Exploitation of this issue requires user interaction in that a victim must open a
39+ malicious file. (CVE-2023-21583)
40+ Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by a
41+ Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution
42+ in the context of the current user. Exploitation of this issue requires user interaction
43+ in that a victim must open a malicious file. (CVE-2023-22226)
44+ Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an
45+ out-of-bounds write vulnerability that could result in arbitrary code execution in the
46+ context of the current user. Exploitation of this issue requires user interaction in
47+ that a victim must open a malicious file. (CVE-2023-22227)
48+ Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an
49+ Improper Input Validation vulnerability that could result in arbitrary code execution in
50+ the context of the current user. Exploitation of this issue requires user interaction in
51+ that a victim must open a malicious file. (CVE-2023-22228)
52+ Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an
53+ out-of-bounds write vulnerability that could result in arbitrary code execution in the
54+ context of the current user. Exploitation of this issue requires user interaction in
55+ that a victim must open a malicious file. (CVE-2023-22229)
56+ Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an
57+ out-of-bounds write vulnerability that could result in arbitrary code execution in the
58+ context of the current user. Exploitation of this issue requires user interaction in
59+ that a victim must open a malicious file. (CVE-2023-22230)
60+ Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an
61+ out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An
62+ attacker could leverage this vulnerability to bypass mitigations such as ASLR.
63+ Exploitation of this issue requires user interaction in that a victim must open a
64+ malicious file. (CVE-2023-22231)
65+ </description >
66+ <oval_repository >
67+ <dates >
68+ <submitted date =" 2023-03-01T12:53:00+00:00" >
69+ <contributor organization =" GFI" >Glenn Lugod</contributor >
70+ </submitted >
71+ </dates >
72+ <status >INITIAL SUBMISSION</status >
73+ <min_schema_version >5.10</min_schema_version >
74+ </oval_repository >
75+ </metadata >
76+ <criteria comment =" Adobe Bridge is installed + version" operator =" AND" >
77+ <extend_definition comment =" Adobe Bridge is installed"
78+ definition_ref =" oval:org.cisecurity:def:7159" />
79+ <criterion comment =" Check if the version of Adobe Bridge is less than 12.0.4"
80+ test_ref =" oval:com.gfi:tst:1533" />
81+ </criteria >
82+ </definition >
0 commit comments