Wednesday, April 2, 2025
HomeCyber Security News75 Vulnerabilities Fixed with Adobe Security Updates for February 2019

75 Vulnerabilities Fixed with Adobe Security Updates for February 2019

Published on

SIEM as a Service

Follow Us on Google News

Adobe has released security updates that cover updates for Adobe Acrobat and Reader, ColdFusion and Creative Cloud Desktop Application.

The security updates cover 75 vulnerabilities out of them 71 resides with the Adobe Acrobat and Reader itself.

Adobe Acrobat and Reader

With the security update adobe patched 71 vulnerabilities Adobe Acrobat and Reader for Windows and MacOS. The updates cover critical and important vulnerabilities.

An attacker could exploit the vulnerability to run arbitrary code on the infected machine in the context of the current user.   

Affected Versions

Acrobat DC    2019.010.20069 and earlier versions 
Acrobat Reader DC 2019.010.20069 and earlier versions
Acrobat 2017 Classic 2017 2017.011.30113 and earlier version
Acrobat Reader 2017 Classic 2017 2017.011.30113 and earlier version
Acrobat DC Classic 2015 2015.006.30464 and earlier versions
Acrobat Reader DC Classic 2015 2015.006.30464 and earlier version

Users are recommended to update with the following versions.

 Acrobat DC        2019.010.20091
Acrobat Reader DC 2019.010.20091
Acrobat 2017 Classic 2017 2017.011.30120
Acrobat Reader DC 2017 Classic 2017 2017.011.30120
Acrobat DC Classic 2015 2015.006.30475
Acrobat Reader DC Classic 2015 2015.006.30475

You can find the complete vulnerability details and CVE in the Adobe advisory.

ColdFusion

The updates cover ColdFusion versions 2018, 2016 and 11, successful exploitation of the vulnerability leads to arbitrary code execution.

ColdFusion 2018    Update 1 and earlier versions   
ColdFusion 2016 Update 7 and earlier versions
ColdFusion 11 Update 15 and earlier versions

Newest versions

ColdFusion 2018      Update 2
ColdFusion 2016 Update 8
ColdFusion 11 Update 16

Creative Cloud Desktop

The security update for Creative Cloud Desktop Application  installer  for Windows resolves the  insecure library  loading  vulnerability in the installer  that could lead to  privilege  escalation, reads the advisory.

Affected version

Creative Cloud Desktop Application (installer)      4.7.0.400 and earlier versions

Fixed Version

Creative Cloud Desktop Application (installer)    4.8.0.410

Related Read

Adobe Released Security Patches for Digital Editions and Connect

87 Vulnerabilities Fixed With Adobe December Security Update for Acrobat and Reader

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Firefox 137 Launches with Patches for High-Severity Security Flaws

Mozilla has officially launched Firefox 137 with crucial security fixes aimed at addressing several...

Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers

A privilege escalation vulnerability in Google Cloud Platform (GCP), dubbed "ImageRunner," was recently discovered...

Apple Fined $162 Million by France Authorities for Mobile Ad Market Domination

French antitrust regulators have imposed a hefty fine of €150 million ($162.4 million) on...

20,000 WordPress Sites at Risk of File Upload & Deletion Exploits

A critical security alert has been issued to WordPress site administrators following the discovery...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Firefox 137 Launches with Patches for High-Severity Security Flaws

Mozilla has officially launched Firefox 137 with crucial security fixes aimed at addressing several...

Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers

A privilege escalation vulnerability in Google Cloud Platform (GCP), dubbed "ImageRunner," was recently discovered...

Apple Fined $162 Million by France Authorities for Mobile Ad Market Domination

French antitrust regulators have imposed a hefty fine of €150 million ($162.4 million) on...