Saturday, March 15, 2025
HomeCyber Security News75 Vulnerabilities Fixed with Adobe Security Updates for February 2019

75 Vulnerabilities Fixed with Adobe Security Updates for February 2019

Published on

SIEM as a Service

Follow Us on Google News

Adobe has released security updates that cover updates for Adobe Acrobat and Reader, ColdFusion and Creative Cloud Desktop Application.

The security updates cover 75 vulnerabilities out of them 71 resides with the Adobe Acrobat and Reader itself.

Adobe Acrobat and Reader

With the security update adobe patched 71 vulnerabilities Adobe Acrobat and Reader for Windows and MacOS. The updates cover critical and important vulnerabilities.

An attacker could exploit the vulnerability to run arbitrary code on the infected machine in the context of the current user.   

Affected Versions

Acrobat DC    2019.010.20069 and earlier versions 
Acrobat Reader DC 2019.010.20069 and earlier versions
Acrobat 2017 Classic 2017 2017.011.30113 and earlier version
Acrobat Reader 2017 Classic 2017 2017.011.30113 and earlier version
Acrobat DC Classic 2015 2015.006.30464 and earlier versions
Acrobat Reader DC Classic 2015 2015.006.30464 and earlier version

Users are recommended to update with the following versions.

 Acrobat DC        2019.010.20091
Acrobat Reader DC 2019.010.20091
Acrobat 2017 Classic 2017 2017.011.30120
Acrobat Reader DC 2017 Classic 2017 2017.011.30120
Acrobat DC Classic 2015 2015.006.30475
Acrobat Reader DC Classic 2015 2015.006.30475

You can find the complete vulnerability details and CVE in the Adobe advisory.

ColdFusion

The updates cover ColdFusion versions 2018, 2016 and 11, successful exploitation of the vulnerability leads to arbitrary code execution.

ColdFusion 2018    Update 1 and earlier versions   
ColdFusion 2016 Update 7 and earlier versions
ColdFusion 11 Update 15 and earlier versions

Newest versions

ColdFusion 2018      Update 2
ColdFusion 2016 Update 8
ColdFusion 11 Update 16

Creative Cloud Desktop

The security update for Creative Cloud Desktop Application  installer  for Windows resolves the  insecure library  loading  vulnerability in the installer  that could lead to  privilege  escalation, reads the advisory.

Affected version

Creative Cloud Desktop Application (installer)      4.7.0.400 and earlier versions

Fixed Version

Creative Cloud Desktop Application (installer)    4.8.0.410

Related Read

Adobe Released Security Patches for Digital Editions and Connect

87 Vulnerabilities Fixed With Adobe December Security Update for Acrobat and Reader

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...