Saturday, December 14, 2024
HomeCyber Security News75 Vulnerabilities Fixed with Adobe Security Updates for February 2019

75 Vulnerabilities Fixed with Adobe Security Updates for February 2019

Published on

SIEM as a Service

Adobe has released security updates that cover updates for Adobe Acrobat and Reader, ColdFusion and Creative Cloud Desktop Application.

The security updates cover 75 vulnerabilities out of them 71 resides with the Adobe Acrobat and Reader itself.

Adobe Acrobat and Reader

With the security update adobe patched 71 vulnerabilities Adobe Acrobat and Reader for Windows and MacOS. The updates cover critical and important vulnerabilities.

- Advertisement - SIEM as a Service

An attacker could exploit the vulnerability to run arbitrary code on the infected machine in the context of the current user.   

Affected Versions

Acrobat DC    2019.010.20069 and earlier versions 
Acrobat Reader DC 2019.010.20069 and earlier versions
Acrobat 2017 Classic 2017 2017.011.30113 and earlier version
Acrobat Reader 2017 Classic 2017 2017.011.30113 and earlier version
Acrobat DC Classic 2015 2015.006.30464 and earlier versions
Acrobat Reader DC Classic 2015 2015.006.30464 and earlier version

Users are recommended to update with the following versions.

 Acrobat DC        2019.010.20091
Acrobat Reader DC 2019.010.20091
Acrobat 2017 Classic 2017 2017.011.30120
Acrobat Reader DC 2017 Classic 2017 2017.011.30120
Acrobat DC Classic 2015 2015.006.30475
Acrobat Reader DC Classic 2015 2015.006.30475

You can find the complete vulnerability details and CVE in the Adobe advisory.

ColdFusion

The updates cover ColdFusion versions 2018, 2016 and 11, successful exploitation of the vulnerability leads to arbitrary code execution.

ColdFusion 2018    Update 1 and earlier versions   
ColdFusion 2016 Update 7 and earlier versions
ColdFusion 11 Update 15 and earlier versions

Newest versions

ColdFusion 2018      Update 2
ColdFusion 2016 Update 8
ColdFusion 11 Update 16

Creative Cloud Desktop

The security update for Creative Cloud Desktop Application  installer  for Windows resolves the  insecure library  loading  vulnerability in the installer  that could lead to  privilege  escalation, reads the advisory.

Affected version

Creative Cloud Desktop Application (installer)      4.7.0.400 and earlier versions

Fixed Version

Creative Cloud Desktop Application (installer)    4.8.0.410

Related Read

Adobe Released Security Patches for Digital Editions and Connect

87 Vulnerabilities Fixed With Adobe December Security Update for Acrobat and Reader

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Nigerian National Extradited to Nebraska for Wire Fraud Charges

United States Attorney Susan Lehr announced the extradition of Abiola Kayode, 37, from Nigeria...

Dell Security Update, Patch for Multiple Critical Vulnerabilities

Dell Technologies has released a security advisory addressing multiple critical vulnerabilities that could expose...

CISA Issues 10 New Advisories on Industrial Control System Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten critical advisories, highlighting vulnerabilities...

FBI Seizes Rydox Marketplace, Arrests Key Administrators

The Federal Bureau of Investigation (FBI) announced the seizure of Rydox, an illicit online...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Nigerian National Extradited to Nebraska for Wire Fraud Charges

United States Attorney Susan Lehr announced the extradition of Abiola Kayode, 37, from Nigeria...

Dell Security Update, Patch for Multiple Critical Vulnerabilities

Dell Technologies has released a security advisory addressing multiple critical vulnerabilities that could expose...

CISA Issues 10 New Advisories on Industrial Control System Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten critical advisories, highlighting vulnerabilities...