Adobe informed customers on Tuesday that it has patched several critical code execution vulnerabilities in its Bridge, Photoshop and Prelude products.
In the Windows and macOS versions of Bridge, Adobe fixed three critical out-of-bounds read and out-of-bounds write vulnerabilities that can be exploited by an attacker to execute arbitrary code in the context of the targeted user.
In Photoshop CC for Windows and macOS, Adobe resolved five critical flaws, including two out-of-bounds read bugs and three out-of-bounds write issues, all of which can be exploited for arbitrary code execution.
In its Prelude video logging software, the company fixed two out-of-bounds read and two out-of-bounds write vulnerabilities. All of them have been rated critical and all of them can be exploited for arbitrary code execution.
All of the security holes patched this week in Bridge, Photoshop and Prelude were reported to Adobe by Mat Powell of Trend Micro’s Zero Day Initiative (ZDI). Earlier this year, Powell was credited by Adobe for reporting memory corruption bugs in Character Animation, Premiere Rush, Premiere Pro, and Audition.
Adobe has also published an advisory to inform customers that it has patched an important severity directory traversal vulnerability in its Reader Mobile product. Exploitation of the weakness can lead to information disclosure.
Adobe says it’s not aware of any attacks exploiting these vulnerabilities and based on the priority ratings it has assigned the company does not expect them to be exploited.
Earlier this month, Adobe announced patching over a dozen vulnerabilities in its Creative Cloud, Media Encoder, Genuine Service, ColdFusion and Download Manager products.
Related: Adobe Patches Critical Code Execution Flaws in Flash, Framemaker
Related: Adobe Patches Over 80 Vulnerabilities in Acrobat Products
Related: Adobe Patches 18 Critical Code Execution Flaws Across Five Products
Related: Critical Flaw in Adobe Creative Cloud App Allows Hackers to Delete Files

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- CISA, NSA Issue Guidance for IAM Administrators
- Analysis: SEC Cybersecurity Proposals and Biden’s National Cybersecurity Strategy
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- ‘Nexus’ Android Trojan Targets 450 Financial Applications
- Tackling the Challenge of Actionable Intelligence Through Context
- Dole Says Employee Information Compromised in Ransomware Attack
- Backslash Snags $8M Seed Financing for AppSec Tech
