Monday, March 3, 2025
HomeSecurity NewsAdobe Released Security Updates for Adobe Acrobat ,Reader and Photoshop CC :...

Adobe Released Security Updates for Adobe Acrobat ,Reader and Photoshop CC : Its Time to Update

Published on

SIEM as a Service

Follow Us on Google News

Adobe just released critical security updates for Adobe Acrobat, Reader and Adobe Photoshop CC along with more than 40 critical security fix for Windows and MacOS.

Few of the vulnerabilities marked as high severity with the Critical rating and the successful Exploitation could lead to attacker run arbitrary code and taking full control of the vulnerable systems.

In this Adobe Security updates, Most of the vulnerabilities in Acrobat DC, Acrobat Reader DC are affected both Windows and macOS.

Few Month before Researchers discovered brand New Zero-day vulnerability with high severity rate in Adobe Flash Player.

Along with this, Adobe fixed a critical Remote Code Execution that has been discovered in Adobe Photoshop CC 19.1.3 and earlier 19.x versions, as well as 18.1.3 and earlier 18.x versions.

Adobe Photoshop versions are affected for both windows and macOS by this remote code execution vulnerabilities that have been discovered by Trend Micro’s Zero Day Initiative.

Vulnerability Details for Acrobat DC, Reader DC

Following vulnerabilities are reported and fixed by Adobe that affected Acrobat DC, Reader DC and Photoshop CC.

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
Double FreeArbitrary Code ExecutionCriticalCVE-2018-4990
Heap OverflowArbitrary Code ExecutionCriticalCVE-2018-4947, CVE-2018-4948, CVE-2018-4966, CVE-2018-4968, CVE-2018-4978, CVE-2018-4982, CVE-2018-4984
Use-after-freeArbitrary Code ExecutionCriticalCVE-2018-4946, CVE-2018-4952, CVE-2018-4954, CVE-2018-4958, CVE-2018-4959, CVE-2018-4961, CVE-2018-4971, CVE-2018-4974, CVE-2018-4977, CVE-2018-4980, CVE-2018-4983, CVE-2018-4988, CVE-2018-4989
Out-of-bounds writeArbitrary Code ExecutionCriticalCVE-2018-4950
Security BypassInformation DisclosureImportantCVE-2018-4979
Out-of-bounds readInformation DisclosureImportantCVE-2018-4949, CVE-2018-4951, CVE-2018-4955, CVE-2018-4956, CVE-2018-4957, CVE-2018-4960, CVE-2018-4962, CVE-2018-4963, CVE-2018-4964, CVE-2018-4967, CVE-2018-4969, CVE-2018-4970, CVE-2018-4972, CVE-2018-4973, CVE-2018-4975, CVE-2018-4976, CVE-2018-4981, CVE-2018-4986, CVE-2018-4985
Type ConfusionArbitrary Code ExecutionCriticalCVE-2018-4953
Untrusted pointer dereferenceArbitrary Code ExecutionCriticalCVE-2018-4987
Memory CorruptionInformation DisclosureImportantCVE-2018-4965
NTLM SSO hash theftInformation DisclosureImportantCVE-2018-4993
HTTP POST new line injection via XFA submissionSecurity BypassImportantCVE-2018-4994

 

Vulnerability Details for Adobe Photoshop CC

Vulnerability CategoryVulnerability ImpactSeverityCVE Number
Out-of-bounds writeRemote Code ExecutionCriticalCVE-2018-4946

Adobe Security updates details for installation to the newest version:

ProductUpdated VersionsPlatformPriority RatingAvailability
Acrobat DC2018.011.20040Windows and macOS1Windows
macOS
Acrobat Reader DC2018.011.20040Windows and macOS1Windows
macOS
     
Acrobat 20172017.011.30080Windows and macOS1Windows
macOS
Acrobat Reader DC 20172017.011.30080Windows and macOS1Windows
macOS
     
Acrobat Reader DC (Classic 2015)2015.006.30418Windows and macOS1Windows
macOS
Acrobat DC (Classic 2015)2015.006.30418Windows and macOS1Windows
macOS
ProductUpdated versionsPlatform
Photoshop CC 201819.1.4Windows and macOS
Photoshop CC 201718.1.4Windows and macOS

Most of the vulnerabilities are categorized as Priority rating as “1” who means the severity of the flaw is high and Adobe assigned Priority rate “3” for Photoshop vulnerability.

All the vulnerabilities are reported by many of the individual and company. CVE has been assigned to all the vulnerabilities.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage...

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations...

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Paragon Partition Manager Vulnerabilities Allow Attackers to Escalate Privileges and Trigger DoS Attacks

Security researchers have uncovered five significant vulnerabilities in Paragon Partition Manager's BioNTdrv.sys driver, affecting...

Substack Custom Domain Vulnerability Exposes Thousands to Potential Hijacking

A newly disclosed vulnerability in Substack's custom domain setup could allow malicious actors to...

PoC Released for Windows Hyper-V SYSTEM Privilege Exploit

Security researchers have publicly disclosed a proof-of-concept (PoC) exploit for CVE-2025-21333, a critical elevation-of-privilege vulnerability...