web analytics

Adobe Patch Tuesday fixed critical vulnerabilities in Magento, Acrobat and Reader – Source: securityaffairs.com

Rate this post

Source: securityaffairs.com – Author: Pierluigi Paganini

Adobe Patch Tuesday fixed critical vulnerabilities in Magento, Acrobat and Reader

Pierluigi Paganini
February 14, 2024

Adobe Patch Tuesday security updates for February 2024 addressed more than 30 vulnerabilities in multiple products, including critical issues.

Adobe Patch Tuesday security updates released by Adobe addressed over 30 vulnerabilities across various products, including critical issues.

The software maker warned of critical flaws in popular products such as Adobe Acrobat and Reader, Adobe Commerce and Magento Open Source, Substance 3D Painter, and FrameMaker.

The company fixed 13 vulnerabilities in the Adobe Acrobat and Reader software, including arbitrary code execution, application denial of service and memory leak vulnerabilities.

“Adobe has released a security update for Adobe Acrobat and Reader for Windows and macOS. This update addresses critical and important vulnerabilities.” reads the advisory. “Successful exploitation could lead to arbitrary code execution, application denial-of-service, and memory leak.”

Below is the list of vulnerabilities addressed by the software vendor:

Vulnerability Category Vulnerability Impact Severity CVSS base score CVSS vector CVE Number
Out-of-bounds Write (CWE-787) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20726
Out-of-bounds Write (CWE-787) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20727
Out-of-bounds Write (CWE-787) Arbitrary code execution Critical 7.8  CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20728
Use After Free (CWE-416) Arbitrary code execution Important 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20729
Integer Overflow or Wraparound (CWE-190) Arbitrary code execution Critical 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20730
Use After Free (CWE-416) Arbitrary code execution Critical 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2024-20731
Improper Input Validation (CWE-20) Application denial-of-service Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2024-20733
Use After Free (CWE-416) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20734
Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20735
Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20736
Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20747
Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20748
Out-of-bounds Read (CWE-125) Memory leak Important 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2024-20749

Below is the list of vulnerabilities addressed by the software firm that impact Adobe Commerce and Magento Open Source products:

Vulnerability Category Vulnerability Impact Severity Authentication required to exploit? Exploit requires admin privileges? CVSS base score CVSS vector CVE number(s)
Cross-site Scripting (Stored XSS) (CWE-79) Arbitrary code execution Critical Yes Yes 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2024-20719
Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78) Arbitrary code execution Critical Yes Yes 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVE-2024-20720
Uncontrolled Resource Consumption (CWE-400) Application denial-of-service Important Yes Yes 5.7 CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:N/A:H CVE-2024-20716
Cross-site Scripting (Stored XSS) (CWE-79) Arbitrary code execution Important Yes Yes 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVE-2024-20717
Cross-Site Request Forgery (CSRF) (CWE-352) Security feature bypass Moderate Yes No 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVE-2024-20718

According to the advisory, the above vulnerabilities can be exploited only by an authenticated attacker.

“Exploit requires admin privileges: The vulnerability is (or is not) only exploitable by an attacker with administrative privileges.” states the advisory.

The good news is that the software vendor is not aware of attacks in the wild exploiting these vulnerabilities.

Microsoft Patch Tuesday security updates for February 2024 resolved a total of 72 vulnerabilities, including two actively exploited zero-days.

The vulnerabilities affect Microsoft Windows and Windows Components; Office and Office Components; Azure; .NET Framework and ASP.NET; SQL Server; Windows Hyper-V; and Microsoft Dynamics.

Five vulnerabilities are rated Critical, 65 are rated Important, and two are rated Moderate in severity.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – ransomware, Patch Tuesday) 



Original Post URL: https://securityaffairs.com/159115/security/adobe-patch-tuesday-february-2024.html

Category & Tags: Breaking News,Security – Breaking News,Security

Views: 0

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post