Adobe Releases Some Security Updates for Acrobat and Photoshop CC

Adobe has recently discharged new forms of its Acrobat DC, Reader and Photoshop CC for Windows and macOS clients that fix 48 vulnerabilities in its software.An aggregate of 47 vulnerabilities influence Adobe Acrobat and Reader applications, and one basic remote code execution imperfection has been fixed in Adobe Photoshop CC.

Out of 47, Adobe Acrobat and Reader influence with 24 basic vulnerabilities—arranged as Double Free, Heap Overflow, Use without after, Out-of-limits compose, Type Confusion, and Untrusted pointer deference—which if misused, could permit subjective code execution with regards to the focused on client

Rest of the 23 flaws, including Security Bypass, Out-of-bounds read, Memory Corruption, NTLM SSO hash theft, and HTTP POST newline injection via XFA submission, are marked as important and can lead to information disclosure or security bypass.


The above-recorded vulnerabilities affect the Windows and macOS variants of Acrobat DC (Consumer and Classic 2015), Acrobat Reader DC (Consumer and Classic 2015), Acrobat 2017, and Acrobat Reader 2017.

The most recent Adobe Acrobat and Reader patches have been given a need rating of "1," which implies the defects are either being abused in the wild or more inclined to be misused in nature. In this way, clients are profoundly prescribed to refresh their product as quickly as time permits.

The defects have been tended to in Acrobat DC and Acrobat Reader DC rendition 2018.011.20040, Acrobat 2017 and Acrobat Reader DC 2017 variant 2017.011.30080, and in addition Acrobat Reader DC (Classic 2015) and Acrobat DC (Classic 2015) form 2015.006.30418.

Security Patch for Adobe Photoshop CC

Adobe has additionally discharged security patches for the Windows and macOS adaptations of Photoshop CC to address a basic powerlessness, classified as "outside the allotted boundaries express" issue, which can be abused to execute self-assertive code with regards to the present client.

The vulnerability (CVE-2018-4946) impacts Photoshop CC 2018 form 19.1.3 and prior 19.x adaptations, and in addition Photoshop CC 2017 variant 18.1.3 and prior 18.x renditions.

The organization credited specialist Giwan Go of Trend Micro's Zero Day Initiative for revealing the defect, which has been tended to with the arrival of Photoshop CC 2018 form 19.1.4 and Photoshop CC 2017 variant 18.1.4.

This refresh has been given a need rating of "3," which implies the aggressors have not focused on the weakness.

Adobe prescribes end clients and executives to introduce the most recent security refreshes at the earliest opportunity.