Tech »  Topic »  Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader

Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader


Adobe documents 35 security flaws in a wide range of products, including code-execution issues in the Acrobat and Reader applications.

Software maker Adobe on Tuesday released fixes for at least 35 security flaws in a wide range of products, including serious code-execution bugs in the widely deployed Acrobat and Reader applications.

As part of its scheduled Patch Tuesday rollout, the San Jose, Calif. company called immediate attention to a high-severity bulletin documenting at least nine security defects in Adobe Acrobat and Reader for Windows and macOS.

The company flagged multiple critical-severity issues and warned that successful exploitation could lead to arbitrary code execution and memory leaks.

Adobe is also pushing users to prioritize an available security update for Adobe InDesign, warning that multiple critical- and important-severity flaws could lead to memory leaks, arbitrary code execution and application denial-of-service.

The company’s Adobe Substance 3D Sampler also received a security makeover ...


Copyright of this story solely belongs to securityweek . To see the full text click HERE