Adobe has released September 2019 Patch Tuesday updates that address two code execution vulnerabilities in Flash Player and a DLL hijacking flaw in Application Manager.
The two flaws addressed with the Flash Player 32.0.0.255 release are a use-after-free issue tracked as CVE-2019-8070, and a same-origin method execution flaw tracked as CVE-2019-8069. Adobe states that the flaws could be exploited by attackers for arbitrary code execution in the context of the targeted user.
“Adobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS. These updates address critical vulnerabilities in Adobe Flash Player. Successful exploitation could lead to arbitrary code execution in the context of the current user.” reads the security advisory published by Adobe.
Both issued are rated as “critical” but Adobe researchers believe that their exploitation is hard and for this reason assigned them a priority rating of 2 (and 3 on Linux systems).
Adobe credited the expert Eduardo Braun Prado and a researcher who decided to remain anonymous for reporting the vulnerabilities.
Adobe also fixed a DLL hijacking vulnerability in the installer of the Application Manager that could be exploited to execute arbitrary code on the affected system. The vulnerability, tracked as CVE-2019-8076, was classified as “important” and received a priority rating of 3.
“Adobe has released a security update for the Adobe Application Manager installer for Windows. This update resolves an insecure library loading vulnerability in the installer that could lead to Arbitrary Code Execution.” reads the security advisory published by Adobe.
The flaw was reported by the security researcher Hamdi Maamri.
“This vulnerability exclusively impacts the installer used with the Adobe Application Manager. CVE-2019-8076 does not impact the existing Application Manager, and there is no action for customer running earlier versions,” continues the security advisory.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Patch Tuesday, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…
The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…
ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…
Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…
Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…
GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…
This website uses cookies.