Security Experts:

Adobe Patches 42 Flaws in Reader, Acrobat, Flash

Adobe informed users on Tuesday that updates released for Acrobat, Reader and Flash Player patch a total of 42 vulnerabilities, including many that could lead to arbitrary code execution.

The updates for Acrobat and Reader versions 11 and 15 address a total of 29 security holes, some of which could allow an attacker to take control of affected systems. The list of flaws includes type confusion, use-after-free, heap buffer overflow and other memory corruption bugs that could result in code execution. A security bypass vulnerability has also been resolved.

The issues affecting Acrobat and Reader have been reported to Adobe by independent researchers and experts working for Clarified Security, Tencent, Source Incite, Fortinet, Cure53 and the Nanyang Technological University.

In the case of Flash Player, version 24.0.0.194 patches 13 critical security holes that can lead to arbitrary code execution or information disclosure. Adobe learned about these flaws from independent researcher Khalil Zhani and experts from Microsoft, Google, Tencent, COSIG and Fortinet.

Adobe says there is no evidence that any of the vulnerabilities patched this week have been exploited in the wild.

Last month, the software giant patched 17 vulnerabilities in Flash Player, including one exploited in targeted attacks aimed at Windows users running Internet Explorer. No additional information has been made available and it’s unclear which threat actor is behind these attacks.

Microsoft has also released its January 2017 Patch Tuesday security bulletins. There are only four bulletins this month, including one that addresses Flash Player vulnerabilities.

Related: Adobe Patches 9 Flash Player Flaws Reported via ZDI

Related: Adobe Patches Flash Vulnerability Used in Targeted Attacks

Related: Adobe Patches Critical Flaws in Flash Player, PDF Apps

Related: U.S. Authorities Reach Settlement With Adobe Over 2013 Breach

view counter
Eduard Kovacs is an international correspondent for SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.