Tuesday, March 5, 2024

Adobe Released August Patch Covering 11 Vulnerabilities That Affects Multiple Popular Adobe Products

Adobe August security updates cover’s 11 security vulnerabilities including two critical vulnerabilities with the most popular Adobe Acrobat and Reader.

With the last July, Tuesday patch Adobe released Security Updates & Fixes for 112 Vulnerabilities that Affected Multiple Adobe Products.

Adobe August Security Updates

Adobe Acrobat and Reader

The security updates cover both the Adobe Acrobat and Reader for Windows and MacOS. Successful exploitation of the vulnerability leads to arbitrary code execution in the context of the current user. The Critical Vulnerability fixed with 2018.011.20058.

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
Out-of-bounds writeArbitrary Code ExecutionCriticalCVE-2018-12808
Untrusted pointer dereferenceArbitrary Code ExecutionCriticalCVE-2018-12799

Adobe Experience Manager

Starting from version 6.0 Adobe Experience Manager suffers a cross-site scripting vulnerability that could result in information disclosure and input validation bypass. It was fixed with Adobe Experience Manager version 6.4.

Adobe Flash Player

Important vulnerabilities with Flash Player 30.0.0.134 and earlier versions for Windows, macOS, Linux and Chrome OS. Successful exploitation of the vulnerability leads to arbitrary code execution in the context of the current user. Users are recommended to update with latest version 30.0.0.154 of Adobe Flash Player.

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
Out-of-bounds readInformation DisclosureImportantCVE-2018-12824
Security bypassSecurity Mitigation BypassImportantCVE-2018-12825
Out-of-bounds readInformation DisclosureImportantCVE-2018-12826
Out-of-bounds readInformation DisclosureImportantCVE-2018-12827
Use of a component with a known vulnerabilityPrivilege EscalationImportantCVE-2018-12828

Creative Cloud Desktop

Adobe creative cloud for windows suffered insecure library loading vulnerability which may lead to privilege escalation. The Vulnerability affects 4.5.0.324 and earlier versions. The Risk can be mitigated by updating to 4.5.5.342.

Vulnerability CategoryVulnerability ImpactSeverityCVE Numbers
Insecure Library Loading (DLL hijacking)Privilege EscalationImportantCVE-2018-5003

Users are recommended to update their software installations to the latest versions, to update manually Help for Adobe security updates > Check for Updates.

US Government agencies to are asked to remove the Adobe Flash contents from websites and computers before August 1, 2019, as Adobe already announced to stop supporting Adobe Flash Media Player in 2020 and it will no longer receive updates or technical support.

Website

Latest articles

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019....

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like...

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie...

Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS)...

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles