Adobe released updates on Tuesday for its Acrobat, Reader and Digital Editions products to address several critical vulnerabilities that can lead to code execution.
With the release of Acrobat and Reader versions 15.010.20060, 15.006.30121 and 11.0.15 for Windows and Mac, Adobe resolved three flaws, including a couple of memory corruption issues (CVE-2016-1007, CVE-2016-1009) and a directory search path bug (CVE-2016-1008) — all of which can be exploited to execute arbitrary code.
Adobe has credited AbdulAziz Hariri and Jasiel Spelman of the Zero Day Initiative, and Jaanus Kp of Clarified Security for responsibly disclosing the vulnerabilities in Reader and Acrobat.
This is the second round of updates released by Adobe this year for Acrobat and Reader. In January, the company updated both products to resolve a total of 17 vulnerabilities.
As for the Adobe Digital Editions eReader software, the company updated the Windows, Mac, Android and iOS versions to 4.5.1 in order to fix a critical memory corruption vulnerability that could lead to code execution (CVE-2016-0954). The security hole, reported by Pier-Luc Maltais of COSIG, affects version 4.5.0 and earlier of the product.
Adobe says there is no evidence that the Acrobat, Reader and Digital Editions flaws patched this week have been exploited for malicious purposes.
Adobe also informed customers on Tuesday that it will release a Flash Player update in the coming days. This will be the second update issued this year for Flash Player, after the February update which patched a total of 22 memory corruption bugs.
Microsoft also released updates on Tuesday to fix tens of important and critical vulnerabilities in Windows, Office, Internet Explorer, Edge and other products.
Related: Adobe Patches 77 Vulnerabilities in Flash Player

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- China’s Offensive Cyber Operations in Africa Support Soft Power Efforts
- SANS Survey Shows Drop in 2023 ICS/OT Security Budgets
- Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones
- Cisco to Acquire Splunk for $28 Billion
- Car Cybersecurity Study Shows Drop in Critical Vulnerabilities Over Past Decade
- Omron Patches PLC, Engineering Software Flaws Discovered During ICS Malware Analysis
- Intel Launches New Attestation Service as Part of Trust Authority Portfolio
- Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems
Latest News
- In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
- China’s Offensive Cyber Operations in Africa Support Soft Power Efforts
- Air Canada Says Employee Information Accessed in Cyberattack
- BIND Updates Patch Two High-Severity DoS Vulnerabilities
- Faster Patching Pace Validates CISA’s KEV Catalog Initiative
- SANS Survey Shows Drop in 2023 ICS/OT Security Budgets
- Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones
- New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware
