Adobe’s Patch Tuesday updates for July 2019 address vulnerabilities in the company’s Bridge CC, Experience Manager and Dreamweaver products, but none of the security holes appear serious.
The latest update for Bridge CC on Windows and macOS resolves an out-of-bounds memory read issue that can result in information disclosure in the context of the targeted user. The security hole was reported to Adobe through Trend Micro’s Zero Day Initiative by researcher Francis Provencher.
In Experience Manager, Adobe patched reflected and stored cross-site scripting (XSS) vulnerabilities and a cross-site request forgery (CSRF) bug, all of which, according to the company, can lead to disclosure of sensitive information. Adobe has only credited Lorenzo Pirondini for the reflected XSS.
In Dreamweaver, specifically its direct download installer for Windows, the firm fixed a DLL hijacking issue that can be exploited for privilege escalation. The weakness was reported to Adobe by a bug bounty hunter who uses the online moniker “Honc.”
The vulnerabilities patched on Tuesday have been classified as having either “important” or “moderate” severity and they have been assigned priority ratings of 2 or 3, which means users do not need to urgently install the updates.
Unsurprisingly, Adobe says there is no evidence that any of the flaws have been exploited for malicious purposes.
Some of Adobe’s past Patch Tuesday updates included fixes for over 80 and even over 100 vulnerabilities, but the latest round of patches only resolves five issues. However, in the past, the company also released out-of-band updates to address weaknesses that had been exploited in the wild.
Related: Adobe Patches 43 Flaws Across Eight Products
Related: Adobe Patches Over 80 Vulnerabilities in Acrobat Products
Related: Adobe Patches Code Execution Flaws in Flash, ColdFusion, Campaign