This issue may affect users of any graphics software that can be exploited through Web browsers. This issue was reported by Dawid Golczak of ICSA Labs. Software Affected: Windows 7. Windows 8. Windows 10. UPDATE: Adobe Product security advisory: APSA19-06. Adobe released a patch on Oct. 3, 2018. Microsoft released a patch on Oct. 14, 2018. Details: The information disclosure vulnerability exists due to the way Adobe interacts with the Windows graphics subsystem. This interaction can be exploited to leak information on a target system. Attackers can use this information to gain an advantage in other ways. For an attack to be successful, a user must open a specially crafted website. Attackers often use social engineering techniques to convince users to visit a malicious site. MITRE researchers have observed attackers attempting to exploit this vulnerability by sending emails disguised as official documents such as purchase receipts. When a user opens the document, their system may be vulnerable to information disclosure.

CVE-2019-5321: Adobe Type Manager Library Information Disclosure Vulnerability. This CVE ID is unique from CVE-2021-29864, CVE-2021-29865.

Adobe Type Manager Library (ATML) information disclosure vulnerability

The Type Manager library (ATML) is a software library that can be used by applications to access the fonts on a computer. This library provides APIs that allow developers to create typeface objects and manipulate those objects within their applications. These APIs are exposed to the application through a programming interface, ATML2.dll.

This vulnerability has been revealed as a result of an uninitialized pointer in the ATML2 Interface. The vulnerability allows remote attackers to execute arbitrary code on vulnerable systems when processing maliciously crafted text content using the API call CreateFontIndirectObject() with specific parameters.

Adobe Type Manager Library information disclosure vulnerability

CVE-2019-5321 was discovered by Dawid Golczak of ICSA Labs. The vulnerability exists due to the way that Adobe handles errors when interacting with the Windows graphics subsystem. This interaction can be exploited to leak information on a target system. Attackers can use this information in other ways. For an attack to be successful, a user must open a specially crafted website. Attackers often use social engineering techniques to convince users to visit a malicious site. MITRE researchers have observed attackers attempting to exploit this vulnerability by sending emails disguised as official documents such as purchase receipts. When a user opens the document, their system may be vulnerable to information disclosure.

Adobe Type Manager Library (ATML) Information Disclosure Vulnerability

This CVE ID is unique from CVE-2021-29864, CVE-2021-29865. The information disclosure vulnerability exists due to the way Adobe interacts with the Windows graphics subsystem. This interaction can be exploited to leak information on a target system. Attackers can use this information to gain an advantage in other ways. For an attack to be successful, a user must open a specially crafted website. Attackers often use social engineering techniques to convince users to visit a malicious site. MITRE researchers have observed attackers attempting to exploit this vulnerability by sending emails disguised as official documents such as purchase receipts. When a user opens the document, their system may be vulnerable to information disclosure.

Adobe Type Manager Library Information Disclosure Vulnerability

The information disclosure vulnerability exists due to the way Adobe interacts with the Windows graphics subsystem. This interaction can be exploited to leak information on a target system. Attackers can use this information to gain an advantage in other ways. For an attack to be successful, a user must open a specially crafted website. Attackers often use social engineering techniques to convince users to visit a malicious site. MITRE researchers have observed attackers attempting to exploit this vulnerability by sending emails disguised as official documents such as purchase receipts. When a user opens the document, their system may be vulnerable to information disclosure.

CVE-2019-5321: Adobe Type Manager Library Information Disclosure Vulnerability

Adobe Type Manager Library (ATML)

Information Disclosure Vulnerability
An information disclosure vulnerability in the Adobe Type Manager Library (ATML) could allow an attacker to read memory from the process space of a target system. This issue was reported by Dawid Golczak of ICSA Labs. Software Affected: Windows 7. Windows 8. Windows 10. UPDATE: Adobe Product security advisory: APSA19-06. Adobe released a patch on Oct. 3, 2018. Microsoft released a patch on October 14, 2018. Details: The vulnerability exists when ATML attempts to allocate new memory for user controlled variables before copying them into their final destination location, which causes it to fail and leak the contents of memory from another process into the target process space if the destination address is adjacent to another user controlled variable in memory that has already been copied by ATML into its final destination location. For an attack to be successful, a user must open a specially crafted website that contains malicious JavaScript code designed to exploit this vulnerability on targeted systems running either Internet Explorer or Edge browsers installed with Adobe Acrobat X Pro or PDFMaker software versions 18 through 20 installed on their system. Attackers use social engineering techniques such as email phishing and fake websites designed to exploit this vulnerability in order to steal sensitive information from affected systems while they are visiting malicious websites disguised as official documents such as purchase receipts or other types of legitimate-looking but false documents or messages containing malicious links leading users to fake websites containing exploitative content. When a user opens the document,

Timeline

Published on: 05/10/2022 21:15:00 UTC
Last modified on: 05/20/2022 14:39:00 UTC

References