web analytics

Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader – Source: www.securityweek.com

Rate this post

Source: www.securityweek.com – Author: Ryan Naraine

Adobe vulnerabilities

Software maker Adobe on Tuesday released fixes for at least 35 security flaws in a wide range of products, including serious code-execution bugs in the widely deployed Acrobat and Reader applications.

As part of its scheduled Patch Tuesday rollout, the San Jose, Calif. company called immediate attention to a high-severity bulletin documenting at least nine security defects in Adobe Acrobat and Reader for Windows and macOS.

The company flagged multiple critical-severity issues and warned that successful exploitation could lead to arbitrary code execution and memory leaks.

Adobe is also pushing users to prioritize an available security update for Adobe InDesign, warning that multiple critical- and important-severity flaws could lead to memory leaks, arbitrary code execution and application denial-of-service.

The company’s Adobe Substance 3D Sampler also received a security makeover with patches for seven documented flaws that expose users to computer takeover attacks.

“ This update addresses critical vulnerabilities in Adobe Substance 3D Sampler. Successful exploitation could lead to arbitrary code execution,” the company said in a bulletin.

Adobe also patched serious bugs in the Adobe Substance 3D Painter, Adobe Substance 3D Designer and Adobe Substance 3D Modeler products. “Successful exploitation could lead to application denial-of-service and arbitrary code execution.”

The company said it was not aware of any reports of in-the-wild exploitation of these vulnerabilities. 

Advertisement. Scroll to continue reading.

Related: Critical Flaws in Adobe Commerce, Photoshop, InDesign, Illustrator

Related: Remote Code Execution Flaw in Microsoft Message Queuing

Related: Code Execution Flaws in Multiple Adobe Software Products

Related: Microsoft Flags Major Bugs in HyperV, Exchange Server 

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

Original Post URL: https://www.securityweek.com/patch-tuesday-critical-code-execution-bugs-in-acrobat-and-reader/

Category & Tags: Risk Management,Vulnerabilities,Acrobat and Reader,Adobe,InDesign,Patch Tuesday – Risk Management,Vulnerabilities,Acrobat and Reader,Adobe,InDesign,Patch Tuesday

Views: 2

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post