Publicités

Adobe addresses four critical flaws in its products

Adobe addressed ten vulnerabilities across its Acrobat and Reader, Connect, Commerce, and Campaign Standard products.

Adobe has released security updates to address ten vulnerabilities across its Acrobat and Reader, Connect, Commerce, and Campaign Standard products.

The IT giant addressed four vulnerabilities in Acrobat and Reader for Windows and macOS, two arbitrary code execution flaws, tracked as CVE-2021-40728 and CVE-2021-40731, and two privilege escalation issues, tracked as CVE-2021-40729 and CVE-2021-40720.

The two arbitrary code execution vulnerabilities have been rated as critical and received a CVSS score of 7.8, they are respectively a use-after-free and out-of-bounds issue vulnerability.

Adobe addressed two vulnerabilities in the Connect product tracked as CVE-2021-40719 and CVE-2021-40721.

The CVE-2021-40719 is a Deserialization of Untrusted Data issue that could lead to arbitrary code execution, it received a CVSS score of 9.8.

The company fixed an important-severity issue, in Acrobat Reader for Android, tracked as CVE-2021-40724, that could lead to arbitrary code execution.

Adobe addressed a critical deserialization vulnerability, tracked as CVE-2021-40720, in Adobe ops-cli, an open source Python wrapper used internally by the company.

The software company fixed an XSS flaw, tracked as CVE-2021-40744, in Adobe Campaign Standard for Windows and Linux.

The company is now aware of attacks in the wild exploiting the above vulnerabilities.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(SecurityAffairs – hacking)

The post Adobe addresses four critical flaws in its products appeared first on Security Affairs.

Publicités

Laisser un commentaire

Ce site utilise Akismet pour réduire les indésirables. En savoir plus sur comment les données de vos commentaires sont utilisées.

Publicités
%d blogueurs aiment cette page :