Security Experts:

Connect with us

Hi, what are you looking for?



Adobe Patches Critical Flaws in Acrobat, Brackets, Photoshop

Adobe’s Patch Tuesday updates for December 2019 fix vulnerabilities in the company’s Acrobat and Reader, Brackets, Photoshop, and ColdFusion products.

Adobe’s Patch Tuesday updates for December 2019 fix vulnerabilities in the company’s Acrobat and Reader, Brackets, Photoshop, and ColdFusion products.

A total of 21 vulnerabilities have been patched in Acrobat and Reader, including critical out-of-bounds write, use-after-free, heap overflow, buffer error, untrusted pointer dereference, and security bypass issues that can be exploited for arbitrary code execution.

Independent experts and researchers from Google, Tencent, SEFCOM Lab, Cisco, HTBLA Leonding, Baidu, STAR Labs, Renmin University of China, and Palo Alto Networks have been credited for reporting the Acrobat and Reader vulnerabilities to Adobe.

In Photoshop CC, Adobe fixed two critical memory corruption flaws that can be exploited to execute arbitrary code in the context of the current user.

In the Brackets source code editor, Adobe patched a critical command injection vulnerability discovered by Google Project Zero researcher Tavis Ormandy. The expert has yet to release any details, but he likely will do so in the upcoming period.

In ColdFusion, Adobe patched an important-severity privilege escalation vulnerability caused by insecure inherited permissions in the default installation folder. The company noted that users who followed the lockdown procedure during installation are not impacted.

Adobe says there is no evidence that any of these flaws have been exploited in the wild and while some of them have been classified as “critical,” the priority ratings they have been assigned suggest that the company does not expect them to be exploited in attacks.

Adobe recently informed customers that support for Acrobat 2015 and Reader 2015 will end on April 7, 2020, and the products will no longer receive any security patches after this date.

Microsoft’s Patch Tuesday updates for December 2019 fix 36 vulnerabilities, including a privilege escalation flaw in Windows that has been exploited in attacks alongside a Chrome zero-day.

Related: Adobe Patches Over 80 Vulnerabilities in Three Products

Related: Adobe Patches Vulnerabilities in Design, Web Products

Related: Adobe Patches 118 Vulnerabilities Across Eight Products

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.