Adobe Plugs Gaping Security Holes in Reader, Acrobat
Software maker Adobe on Tuesday shipped patches for at least 56 security vulnerabilities in a wide range of products, some serious enough to expose Windows and macOS users to code execution attacks.
Adobe called special attention to its APSB23-24 bulletin that covers critical-severity security flaws in the widely deployed Adobe Acrobat and Reader software.
“Successful exploitation could lead to arbitrary code execution, privilege escalation, security feature bypass and memory leak,” Adobe said in a warning addressed to both Windows and macOS users.
The company documented at least 16 vulnerabilities in the Acrobat and Reader updates and said it was not aware of any in-the-wild exploitation.
Adobe also documented critical-severity code execution flaws in Adobe Digital Editions (Windows) and Adobe InCopy (Windows and macOS).
The April batch of Patch Tuesday updates also provides cover for 14 documented issues in Adobe Substance 3D Stager (Windows and macOS), some serious enough to lead to arbitrary code execution and memory leak in the context of the current user.
Adobe also rolled out patches for Adobe Dimension (15 critical and important vulnerabilities), Adobe Substance 3D Designer (9 critical bugs) that expose Windows and macOS users to arbitrary code execution in the context of the current user.
Related: Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days
Related: Chrome 111 Update Patches High-Severity Vulnerabilities
Related: Samsung Mobile Chipsets Vulnerable to Baseband Code Execution Exploits