Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday March 19 2020, @12:18PM   Printer-friendly
from the pictures-or-it-didn't-happen dept.

Arthur T Knackerbracket has found the following story:

Adobe has released out-of-band updates addressing critical vulnerabilities in its Photoshop and Acrobat Reader products, which if exploited could allow arbitrary code-execution.

Overall, Adobe on Wednesday patched flaws tied to 41 CVEs across its products, 29 of which were critical in severity. The fixes were released outside of Adobe’s regularly scheduled update day, which was earlier in March (during which, in fact, Adobe had no patches).

In this most recent group, Adobe Photoshop had the most vulnerabilities fixed, with 22 CVEs addressed overall, 16 of which were critical: “Adobe has released updates for Photoshop for Windows and macOS. These updates resolve multiple critical and important vulnerabilities,” according to Adobe’s advisory. “Successful exploitation could lead to arbitrary code-execution in the context of the current user.”

[...] Adobe also addressed 13 vulnerabilities in Acrobat and Reader, including nine critical flaws. [...] All of these critical flaws enable arbitrary code execution in the context of the current user, according to Adobe.

[...] Other vulnerabilities include two critical flaws in Adobe ColdFusion

[...] Two critical flaws were also rooted out in Adobe Bridge that could enable arbitrary code execution [...] And, Adobe also patched important severity flaws in its Adobe Genuine Integrity Service and Adobe Experience Manager.

While Adobe had no regularly scheduled updates earlier in March, it did stomp out flaws tied to 42 CVEs in its regularly scheduled February updates, with 35 of those flaws being critical in severity. That well trumped Adobe’s January security update, which addressed just nine vulnerabilities overall, including ones in Adobe Illustrator CC and Adobe Experience Manager.

See the linked article for the CVE (Common Vulnerabilities and Exposures) IDs.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by Booga1 on Thursday March 19 2020, @05:40PM

    by Booga1 (6333) on Thursday March 19 2020, @05:40PM (#973255)

    Adobe Acrobat/Reader is up there, but Adobe Flash is probably the record holder specifically for critical whole system compromising vulnerabilities. It's obvious they can't figure out how to secure it.
    There's a reason even Adobe supported HTML5 as a way to get rid of Flash and their constant headline grabbing incompetence. They want to sell the tools that develop HTML5 and offload any vulnerabilities to the browsers directly. Honestly, it's a smart move on their part.

    Starting Score:    1  point
    Moderation   +1  
       Informative=1, Total=1
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3