Adobe addressed two critical vulnerabilities in the Acrobat and Reader products, a use-after-free issue and a security bypass flaw.
The flaws affect the latest versions of Acrobat DC, Acrobat Reader DC, Acrobat 2017 and Acrobat Reader DC 2017 for Windows and macOS.
“Adobe has released security updates for Adobe Acrobat and Reader for Windows and MacOS. These updates address critical vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.” reads the security advisory published by Adobe.
The first flaw tracked as CVE-2018-16011 is a use-after-free bug that can lead to arbitrary code execution in the context of the current user. The second issue tracked as CVE-2018-19725 , is a security bypass vulnerability that can result in privilege escalation.
Both flaws received a priority rating of 2 because experts at Adobe believe that their exploitation is not imminent.
Adobe credited Sebastian Apelt and Abdul Aziz Hariri respectively for reporting the CVE-2018-16011 and the CVE-2018-19725 flaws.
Both experts reported the flaws via the Trend Micro’s Zero Day Initiative (ZDI).
Adobe urges administrators to install the security patches within 30 days.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Adobe Acrobat, hacking)
[adrotate banner=”5″] [adrotate banner=”13″]
WordPress Jetpack plugin issued an update to fix a critical flaw allowing logged-in users to…
Pokemon dev Game Freak confirmed that an August cyberattack led to source code leaks and…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet products and Ivanti CSA bugs to…
An alleged nation-state actor exploited three zero-day vulnerabilities in Ivanti Cloud Service Appliance (CSA) in…
Dutch police dismantled Bohemia/Cannabia, two major dark web markets for illegal goods, drugs, and cybercrime…
US-based financial services company Fidelity Investments warns 77,000 individuals of a data breach that exposed…
This website uses cookies.