Source: www.securityweek.com – Author: Ryan Naraine
Software maker Adobe on Tuesday released fixes for at least 35 security flaws in a wide range of products, including serious code-execution bugs in the widely deployed Acrobat and Reader applications.
As part of its scheduled Patch Tuesday rollout, the San Jose, Calif. company called immediate attention to a high-severity bulletin documenting at least nine security defects in Adobe Acrobat and Reader for Windows and macOS.
The company flagged multiple critical-severity issues and warned that successful exploitation could lead to arbitrary code execution and memory leaks.
Adobe is also pushing users to prioritize an available security update for Adobe InDesign, warning that multiple critical- and important-severity flaws could lead to memory leaks, arbitrary code execution and application denial-of-service.
The company’s Adobe Substance 3D Sampler also received a security makeover with patches for seven documented flaws that expose users to computer takeover attacks.
“ This update addresses critical vulnerabilities in Adobe Substance 3D Sampler. Successful exploitation could lead to arbitrary code execution,” the company said in a bulletin.
Adobe also patched serious bugs in the Adobe Substance 3D Painter, Adobe Substance 3D Designer and Adobe Substance 3D Modeler products. “Successful exploitation could lead to application denial-of-service and arbitrary code execution.”
The company said it was not aware of any reports of in-the-wild exploitation of these vulnerabilities.
Advertisement. Scroll to continue reading.
Related: Critical Flaws in Adobe Commerce, Photoshop, InDesign, Illustrator
Related: Remote Code Execution Flaw in Microsoft Message Queuing
Related: Code Execution Flaws in Multiple Adobe Software Products
Related: Microsoft Flags Major Bugs in HyperV, Exchange Server
Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
Daily Briefing Newsletter
Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.
Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.
Original Post URL: https://www.securityweek.com/patch-tuesday-critical-code-execution-bugs-in-acrobat-and-reader/
Category & Tags: Risk Management,Vulnerabilities,Acrobat and Reader,Adobe,InDesign,Patch Tuesday – Risk Management,Vulnerabilities,Acrobat and Reader,Adobe,InDesign,Patch Tuesday
Views: 2