Over 100 Vulnerabilities Patched in Adobe Acrobat, Reader
18.7.18 securityweek 

Adobe on Tuesday released security updates that patch 105 vulnerabilities in Acrobat and Reader, two in Flash Player, three in Experience Manager, and three in Connect.

The latest versions of Acrobat and Reader for Windows and macOS address tens of critical memory corruption bugs that can allow remote code execution, including double-free, heap overflow, use-after-free, out-of-bounds write, type confusion, untrusted pointer dereference, and buffer error issues.

The list of weaknesses fixed with this month’s Patch Tuesday updates also includes a critical privilege escalation and tens of important out-of-bounds read issues that lead to information disclosure.

Over two dozen researchers have been credited for responsibly disclosing these flaws to Adobe. Many of the security holes were reported to the vendor through Trend Micro’s Zero-Day Initiative (ZDI).

In the case of Flash Player, version resolves a critical type confusion issue that can lead to code execution and a flaw rated important that can result in information disclosure.

Hotfixes released by Adobe for Experience Manager patch three server-side request forgery (SSRF) vulnerabilities that can lead to the exposure of sensitive information, but none of the flaws are considered critical.

Finally, updates released for Adobe Connect fix authentication bypass and insecure library loading flaws that have been assigned medium and important severity ratings.

Adobe says it’s not aware of any malicious exploitation attempts for the vulnerabilities patched with this round of updates and the company does not expect to see attacks leveraging these flaws any time soon.