Monday, March 3, 2025
HomeComputer SecurityAdobe Released August Patch Covering 11 Vulnerabilities That Affects Multiple Popular Adobe...

Adobe Released August Patch Covering 11 Vulnerabilities That Affects Multiple Popular Adobe Products

Published on

SIEM as a Service

Follow Us on Google News

Adobe August security updates cover’s 11 security vulnerabilities including two critical vulnerabilities with the most popular Adobe Acrobat and Reader.

With the last July, Tuesday patch Adobe released Security Updates & Fixes for 112 Vulnerabilities that Affected Multiple Adobe Products.

Adobe August Security Updates

Adobe Acrobat and Reader

The security updates cover both the Adobe Acrobat and Reader for Windows and MacOS. Successful exploitation of the vulnerability leads to arbitrary code execution in the context of the current user. The Critical Vulnerability fixed with 2018.011.20058.

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
Out-of-bounds writeArbitrary Code ExecutionCriticalCVE-2018-12808
Untrusted pointer dereferenceArbitrary Code ExecutionCriticalCVE-2018-12799

Adobe Experience Manager

Starting from version 6.0 Adobe Experience Manager suffers a cross-site scripting vulnerability that could result in information disclosure and input validation bypass. It was fixed with Adobe Experience Manager version 6.4.

Adobe Flash Player

Important vulnerabilities with Flash Player 30.0.0.134 and earlier versions for Windows, macOS, Linux and Chrome OS. Successful exploitation of the vulnerability leads to arbitrary code execution in the context of the current user. Users are recommended to update with latest version 30.0.0.154 of Adobe Flash Player.

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
Out-of-bounds readInformation DisclosureImportantCVE-2018-12824
Security bypassSecurity Mitigation BypassImportantCVE-2018-12825
Out-of-bounds readInformation DisclosureImportantCVE-2018-12826
Out-of-bounds readInformation DisclosureImportantCVE-2018-12827
Use of a component with a known vulnerabilityPrivilege EscalationImportantCVE-2018-12828

Creative Cloud Desktop

Adobe creative cloud for windows suffered insecure library loading vulnerability which may lead to privilege escalation. The Vulnerability affects 4.5.0.324 and earlier versions. The Risk can be mitigated by updating to 4.5.5.342.

Vulnerability CategoryVulnerability ImpactSeverityCVE Numbers
Insecure Library Loading (DLL hijacking)Privilege EscalationImportantCVE-2018-5003

Users are recommended to update their software installations to the latest versions, to update manually Help for Adobe security updates > Check for Updates.

US Government agencies to are asked to remove the Adobe Flash contents from websites and computers before August 1, 2019, as Adobe already announced to stop supporting Adobe Flash Media Player in 2020 and it will no longer receive updates or technical support.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage...

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations...

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...