"Adobe Plugs Gaping Security Holes in Reader, Acrobat"

Software maker Adobe recently shipped patches for at least 56 security vulnerabilities in a wide range of products, some severe enough to expose Windows and macOS users to code execution attacks.  Adobe called special attention to its APSB23-24 bulletin that covers critical-severity security flaws in the widely deployed Adobe Acrobat and Reader software.  Adobe said successful exploitation could lead to arbitrary code execution, privilege escalation, security feature bypass, and memory leak.  Adobe documented at least 16 vulnerabilities in the Acrobat and Reader updates and said it was unaware of any in-the-wild exploitation.  Adobe also documented critical-severity code execution flaws in Adobe Digital Editions (Windows) and Adobe InCopy (Windows and macOS).  The April batch of Patch Tuesday updates also provides cover for 14 documented issues in Adobe Substance 3D Stager (Windows and macOS), some severe enough to lead to arbitrary code execution and memory leak in the context of the current user.  Adobe also recently rolled out patches for Adobe Dimension (15 critical and important vulnerabilities) and Adobe Substance 3D Designer (9 critical bugs) that expose Windows and macOS users to arbitrary code execution in the context of the current user. 

 

SecurityWeek reports: "Adobe Plugs Gaping Security Holes in Reader, Acrobat"

Submitted by Anonymous on