Adobe addressed two critical vulnerabilities in the Acrobat and Reader products, a use-after-free issue and a security bypass flaw.
The flaws affect the latest versions of Acrobat DC, Acrobat Reader DC, Acrobat 2017 and Acrobat Reader DC 2017 for Windows and macOS.
“Adobe has released security updates for Adobe Acrobat and Reader for Windows and MacOS. These updates address critical vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.” reads the security advisory published by Adobe.
The first flaw tracked as CVE-2018-16011 is a use-after-free bug that can lead to arbitrary code execution in the context of the current user. The second issue tracked as
Both flaws received a priority rating of 2 because experts at Adobe believe that their exploitation is not imminent.
Adobe credited Sebastian Apelt and Abdul Aziz Hariri respectively for reporting the CVE-2018-16011 and the CVE-2018-19725 flaws.
Both experts reported the flaws via the Trend Micro’s Zero Day Initiative (ZDI).
Adobe urges administrators to install the security patches within 30 days.
| [adrotate banner=”9″] ||[adrotate banner=”12″]|
(SecurityAffairs – Adobe Acrobat, hacking)
[adrotate banner=”5″] [adrotate banner=”13″]