Adobe on Tuesday released patches for Acrobat and Reader, Flash Player, ColdFusion and Creative Cloud. One of the Reader flaws is a critical data leakage issue whose details were made public by a researcher in January.
The company has resolved a total of 71 vulnerabilities in Acrobat and Reader products. One of them has been described as an information disclosure problem that can lead to sensitive data getting leaked.
The flaw was detailed in a blog post published in late January by researcher Alex Inführ, who showed how it can be exploited by a specially crafted PDF document to send SMB requests to the attacker’s server when the file is opened.
The vulnerability is similar to CVE-2018-4993, which Adobe patched last year. It allows a remote attacker to steal a user’s NTLM hash included in an SMB request, and it can be leveraged to alert an attacker when their malicious PDF document has been opened by the targeted user.
0patch, which creates third-party fixes for unpatched vulnerabilities, released an unofficial patch for this issue on Monday, one day before Adobe released its security updates. This micropatch alerts the user when a document attempts to connect to a remote server and allows them to block the connection before any data is sent.
Adobe told SecurityWeek that it has assigned the CVE 2019-7089 identifier to this vulnerability. The company says it’s aware of the publicly available “technical write-up” for this security hole.
This is the second time Adobe patches a vulnerability similar to CVE-2018-4993.
The other weaknesses patched by Adobe on Tuesday in Acrobat and Reader include many critical arbitrary code execution flaws caused by memory corruption bugs.
In Flash Player, which will receive security updates until the end of 2020, Adobe patched only one “important” vulnerability that can result in information disclosure.
Two flaws – one that allows code execution and an XSS bug that can lead to information disclosure – have been resolved in ColdFusion. One vulnerability has also been patched in the installer of the Creative Cloud desktop application.
Adobe says it’s not aware of in-the-wild exploits for any of the vulnerabilities fixed with its February 2019 Patch Tuesday updates.
Related: Two Critical Flaws Patched in Adobe Acrobat, Reader
Related: Flash Player Update Patches Disclosed Code Execution Flaw
Related: Adobe Patches Information Disclosure Flaws in Experience Manager

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April
- US to Adopt New Restrictions on Using Commercial Spyware
- Hackers Earn Over $1 Million at Pwn2Own Exploit Contest
- GoAnywhere Zero-Day Attack Hits Major Orgs
- Australia Dismantles BEC Group That Laundered $1.7 Million
- ‘Grim’ Criminal Abuse of ChatGPT is Coming, Europol Warns
- Webinar Tomorrow: Understanding Hidden Third-Party Identity Access Risks
- GitHub Rotates Publicly Exposed RSA SSH Private Key
