Adobe informed users on Tuesday that updates released for Acrobat, Reader and Flash Player patch a total of 42 vulnerabilities, including many that could lead to arbitrary code execution.
The updates for Acrobat and Reader versions 11 and 15 address a total of 29 security holes, some of which could allow an attacker to take control of affected systems. The list of flaws includes type confusion, use-after-free, heap buffer overflow and other memory corruption bugs that could result in code execution. A security bypass vulnerability has also been resolved.
The issues affecting Acrobat and Reader have been reported to Adobe by independent researchers and experts working for Clarified Security, Tencent, Source Incite, Fortinet, Cure53 and the Nanyang Technological University.
In the case of Flash Player, version 220.127.116.11 patches 13 critical security holes that can lead to arbitrary code execution or information disclosure. Adobe learned about these flaws from independent researcher Khalil Zhani and experts from Microsoft, Google, Tencent, COSIG and Fortinet.
Adobe says there is no evidence that any of the vulnerabilities patched this week have been exploited in the wild.
Last month, the software giant patched 17 vulnerabilities in Flash Player, including one exploited in targeted attacks aimed at Windows users running Internet Explorer. No additional information has been made available and it’s unclear which threat actor is behind these attacks.
Microsoft has also released its January 2017 Patch Tuesday security bulletins. There are only four bulletins this month, including one that addresses Flash Player vulnerabilities.