Top tech giants—Apache, Adobe, DLL, Firefox, and Intel—have patched vulnerabilities in their respective systems.

At Apache, researchers have identified faults in two dozen Apache Struts security advisories, which caution users of susceptibilities in the current open-source web app development framework. They say that the security advisories listed inappropriate versions affected by the flaws.

They include advisories for CVEs issued between 2008 and 2017, such as CVE-2017-12611CVE-2017-9793 and CVE-2017-9791. Affected Apache Struts software versions that were part of the flawed advisories range from types 2.0.0 to 2.5.12.

Of late, Trend Micro repaired a few DLL takeover flaws in Password Manager that could let malicious performers to intensify privileges, make their malware tenacious, and to load and implement their payloads via a signed service.

Tracked as CVE-2019-14684 and CVE-2019-14687, the vulnerabilities were testified by researchers at SafeBreach and Infiniti Team, which says that the flaws are same, but target diverse DLLs.

An invader can misuse the susceptibility to have their malicious payloads loaded and performed by a signed process, which can be used to sidestep application whitelisting devices.

On Tuesday, Adobe’s eight Patch updates highlighted multiple vulnerabilities, including 76 in Acrobat and Acrobat Reader, that were regarded significant as well as numerous in Creative Cloud and Experience Manager valued serious.

According to an Adobe Security Bulletin, successful manipulation of the Acrobat and Acrobat Reader susceptibilities could lead to random code implementation in the context of the current user.

Released by Mozilla for Firefox, the latest update fixes a susceptibility that can be misused to avoid the principal password of the built-in password manager and gain stored passwords.

Regarded as “moderate impact” and tracked as CVE-2019-11733, the vulnerability was repaired on Wednesday with the release of Firefox 68.0.2.

Also, some of the updates issued by Intel as part of the August 2019 Patch Tuesday patch high-severity susceptibilities in NUC firmware, the Processor Identification Utility, and the Computing Improvement Program.

The Intel PIU for Windows is impacted by an inadequate access control issue, precisely a hardware abstraction driver. Tracked as CVE-2019-11163, this high-severity fault lets privilege growth, DoS attacks and information revelation, but misuse requires verification to the targeted system.

The tech colossus also apprised customers that its RAID Web Console 2 (RWC2) product is impacted by a medium-severity information revelation fault that can be exploited without verification.

Leave a Reply

Your email address will not be published. Required fields are marked *