Adobe addressed two critical vulnerabilities in the Acrobat and Reader products, a use-after-free issue and a security bypass flaw.
The flaws affect the latest versions of Acrobat DC, Acrobat Reader DC, Acrobat 2017 and Acrobat Reader DC 2017 for Windows and macOS.
“Adobe has released security updates for Adobe Acrobat and Reader for Windows and MacOS. These updates address critical vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.” reads the security advisory published by Adobe.
The first flaw tracked as CVE-2018-16011 is a use-after-free bug that can lead to arbitrary code execution in the context of the current user. The second issue tracked as CVE-2018-19725 , is a security bypass vulnerability that can result in privilege escalation.
Both flaws received a priority rating of 2 because experts at Adobe believe that their exploitation is not imminent.
Adobe credited Sebastian Apelt and Abdul Aziz Hariri respectively for reporting the CVE-2018-16011 and the CVE-2018-19725 flaws.
Both experts reported the flaws via the Trend Micro’s Zero Day Initiative (ZDI).
Adobe urges administrators to install the security patches within 30 days.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Adobe Acrobat, hacking)
[adrotate banner=”5″] [adrotate banner=”13″]
Ivanti patched over a dozen Endpoint Manager flaws, including a high-severity auth bypass that let…
A Conduent breach exposed data of nearly 17,000 Volvo Group North America employees as the…
Researchers discovered Reynolds ransomware, which uses BYOVD technique to disable security tools and evade detection…
A new Linux botnet, SSHStalker, has infected about 7,000 systems using old 2009-era exploits, IRC…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Office and Microsoft Windows flaws to…
Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-day vulnerabilities. Microsoft…
This website uses cookies.