Adobe released updates on Tuesday for its Acrobat, Reader and Digital Editions products to address several critical vulnerabilities that can lead to code execution.
With the release of Acrobat and Reader versions 15.010.20060, 15.006.30121 and 11.0.15 for Windows and Mac, Adobe resolved three flaws, including a couple of memory corruption issues (CVE-2016-1007, CVE-2016-1009) and a directory search path bug (CVE-2016-1008) — all of which can be exploited to execute arbitrary code.
Adobe has credited AbdulAziz Hariri and Jasiel Spelman of the Zero Day Initiative, and Jaanus Kp of Clarified Security for responsibly disclosing the vulnerabilities in Reader and Acrobat.
This is the second round of updates released by Adobe this year for Acrobat and Reader. In January, the company updated both products to resolve a total of 17 vulnerabilities.
As for the Adobe Digital Editions eReader software, the company updated the Windows, Mac, Android and iOS versions to 4.5.1 in order to fix a critical memory corruption vulnerability that could lead to code execution (CVE-2016-0954). The security hole, reported by Pier-Luc Maltais of COSIG, affects version 4.5.0 and earlier of the product.
Adobe says there is no evidence that the Acrobat, Reader and Digital Editions flaws patched this week have been exploited for malicious purposes.
Adobe also informed customers on Tuesday that it will release a Flash Player update in the coming days. This will be the second update issued this year for Flash Player, after the February update which patched a total of 22 memory corruption bugs.
Microsoft also released updates on Tuesday to fix tens of important and critical vulnerabilities in Windows, Office, Internet Explorer, Edge and other products.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Siemens License Manager Vulnerabilities Allow ICS Hacking
- CISA Releases Open Source Recovery Tool for ESXiArgs Ransomware
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
Latest News
- Siemens License Manager Vulnerabilities Allow ICS Hacking
- UN Experts: North Korean Hackers Stole Record Virtual Assets
- Russian Admits in US Court to Laundering Money for Ryuk Ransomware Gang
- A Deep Dive Into the Growing GootLoader Threat
- CISA Releases Open Source Recovery Tool for ESXiArgs Ransomware
- Patient Information Compromised in Data Breach at San Diego Healthcare Provider
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
