Adobe addressed two critical vulnerabilities in the Acrobat and Reader products, a use-after-free issue and a security bypass flaw.
The flaws affect the latest versions of Acrobat DC, Acrobat Reader DC, Acrobat 2017 and Acrobat Reader DC 2017 for Windows and macOS.
“Adobe has released security updates for Adobe Acrobat and Reader for Windows and MacOS. These updates address critical vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.” reads the security advisory published by Adobe.
The first flaw tracked as CVE-2018-16011 is a use-after-free bug that can lead to arbitrary code execution in the context of the current user. The second issue tracked as CVE-2018-19725 , is a security bypass vulnerability that can result in privilege escalation.
Both flaws received a priority rating of 2 because experts at Adobe believe that their exploitation is not imminent.
Adobe credited Sebastian Apelt and Abdul Aziz Hariri respectively for reporting the CVE-2018-16011 and the CVE-2018-19725 flaws.
Both experts reported the flaws via the Trend Micro’s Zero Day Initiative (ZDI).
Adobe urges administrators to install the security patches within 30 days.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Adobe Acrobat, hacking)
[adrotate banner=”5″] [adrotate banner=”13″]
Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware…
Sophos fixed three Sophos Firewall flaws that could lead to SQL injection, privileged SSH access…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds BeyondTrust Privileged Remote Access (PRA) and Remote…
Raccoon Infostealer operator Mark Sokolovsky was sentenced to 60 months in US prison and ordered…
Juniper Networks warns that a Mirai botnet is targeting SSR devices with default passwords after…
Fortinet warns of a patched FortiWLM vulnerability that could allow admin access and sensitive information…
This website uses cookies.