Adobe released updates on Tuesday for its Acrobat, Reader and Digital Editions products to address several critical vulnerabilities that can lead to code execution.
With the release of Acrobat and Reader versions 15.010.20060, 15.006.30121 and 11.0.15 for Windows and Mac, Adobe resolved three flaws, including a couple of memory corruption issues (CVE-2016-1007, CVE-2016-1009) and a directory search path bug (CVE-2016-1008) — all of which can be exploited to execute arbitrary code.
Adobe has credited AbdulAziz Hariri and Jasiel Spelman of the Zero Day Initiative, and Jaanus Kp of Clarified Security for responsibly disclosing the vulnerabilities in Reader and Acrobat.
This is the second round of updates released by Adobe this year for Acrobat and Reader. In January, the company updated both products to resolve a total of 17 vulnerabilities.
As for the Adobe Digital Editions eReader software, the company updated the Windows, Mac, Android and iOS versions to 4.5.1 in order to fix a critical memory corruption vulnerability that could lead to code execution (CVE-2016-0954). The security hole, reported by Pier-Luc Maltais of COSIG, affects version 4.5.0 and earlier of the product.
Adobe says there is no evidence that the Acrobat, Reader and Digital Editions flaws patched this week have been exploited for malicious purposes.
Adobe also informed customers on Tuesday that it will release a Flash Player update in the coming days. This will be the second update issued this year for Flash Player, after the February update which patched a total of 22 memory corruption bugs.
Microsoft also released updates on Tuesday to fix tens of important and critical vulnerabilities in Windows, Office, Internet Explorer, Edge and other products.