Adobe Critical Code-Execution Flaws Plague Windows Users:
Adobe has issued patches for a slew of critical security vulnerabilities, which, if exploited, could allow for arbitrary code execution on vulnerable Windows systems.
Affected products include Adobe's Framemaker document processor, designed for writing and editing large or complex documents; Adobe's Connect software used for remote web conferencing; and the Adobe Creative Cloud software suite for video editing.
"Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates," according to an Adobe spokesperson.
Adobe fixed a critical flaw (CVE-2021-21056) in Framemaker, which could allow for arbitrary code execution if exploited. The vulnerability is an out-of-bounds read error; which is a type of buffer-overflow flaw where the software reads data past the end of the intended buffer. An attacker who can read out-of-bounds memory might be able to get "secret values" (like memory addresses) that could ultimately allow him to achieve code execution or denial of service.
[...] Adobe also fixed three critical vulnerabilities in the desktop application version of Adobe Creative Cloud for Windows users.
Two of the three critical flaws could enable arbitrary code execution: One of these (CVE-2021-21068) stems from an arbitrary file-overwrite hole, while the other (CVE-2021-21078) exists due to an OS command-injection error. The third critical flaw (CVE-2021-21069) stems from improper input validation and could allow an attacker to gain escalated privileges.
[...] Several critical- and important-severity bugs were patched in Adobe Connect.
One critical bug (CVE-2021-21078) stemmed from improper input validation; this could allow for arbitrary code execution.
And, three important cross-site scripting (XSS) flaws (CVE-2021-21079, CVE-2021-21080, CVE-2021-21081) were patched. These could allow for arbitrary JavaScript execution in the victim's browser, if exploited.
(Score: 3, Informative) by meustrus on Thursday March 11 2021, @04:47AM
Look, anybody that cares about security vulnerabilities knows what arbitrary code execution means. The ways a particular flaw enables that can be interesting at times.
But when I see a story like this, I have one question: what is the attack vector? Seriously. Is this a flaw in some networking aspect of the program? Or do I need to open a specially crafted file?
It's impossible to know what your exposure is when these blurbs don't say whether I need to be careful about email attachments (like I'm not already), or uninstall the program.
(for this story, it doesn't particularly matter to me because I don't even use these Adobe products. However, this has been a trend in security reporting on this site in general)
If there isn't at least one reference or primary source, it's not +1 Informative. Maybe the underused +1 Interesting?