Adobe recently released its October series of security updates. It was on Patch Tuesday last week, and it’s already roaring in with scores of fixes for Experience Manager, Experience Manager Forms, Adobe Acrobat and Reader and Download Manager. The issue which was being monitored negatively impacts Windows, macOS, Android, and Chrome OS versions of the popular software.

Much of these security loopholes have been identified to Adobe by researchers via Trend Micro’s Zero Day Initiative (ZDI). The company has patched a vast number of vulnerabilities in its products, which include heap overflow, buffer error, double-free, use-after-free, type confusion, and out-of-bound write issues that can be manipulated to execute arbitrary code on vulnerable systems.

This tech genius also cited over two dozen researchers from Baidu, Tencent, Google, Source Incite, Knownsec, Codemize, SEFCOM Lab, STAR Labs, Flexera, Cisco Talos, Viettel Cyber Security, Qihoo 360, and Palo Alto Networks to expose vulnerabilities to Acrobat and Reader.

In particular, Adobe Acrobat and Reader has been reported to get the most patches with 67 vulnerabilities. Most of the critical issues centered on out-of-bound write, after free and a heap overflow problem that could lead to arbitrary code execution.

Adobe’s Experience Manager Marketing Solution has been patched with multiple vulnerabilities that could be targeted to gain unauthorized access to the Experience Manager environment of the organization.

In fact, one moderate-severity cross-site scripting (XSS) that could lead to the exposure of sensitive data has also been addressed by Adobe in Experience Manager Forms.

Moreover, Adobe patched a privilege escalation susceptibility in the Windows Download Manager due to insecure folder permissions.

Leave a Reply

Your email address will not be published. Required fields are marked *