Adobe released on Tuesday patches for its Creative Cloud, RoboHelp Server and AIR products.
Adobe’s Patch Tuesday security bulletins address an “important” vulnerability in the sync process for Creative Cloud Libraries (CVE-2016-1034). The issue, which affects version 3.5.1.209 and earlier of the Creative Cloud desktop application for Windows and Mac, can be exploited to remotely read and write files on the targeted client’s file system.
The flaw, patched with the release of Creative Cloud 3.6.0.244, was reported by Roger Chen of the University of California, Berkeley, and JungHoon Lee (lokihardt), who has often been credited by Google, Apple and Adobe for reporting security bugs.
Adobe has also released a security hotfix for version 9 of RoboHelp Server, a server-based help solution that provides real-time end-user feedback on help systems and knowledgebases.
The hotfix patches a critical vulnerability related to the handling of SQL queries (CVE-2016-1035). Exploitation of the flaw reported by Curtis Brazzell of Pondurance can lead to information disclosure.
Earlier this month, Adobe released a security update for Flash Player to patch 24 vulnerabilities, including one that had been exploited by the Magnitude exploit kit before a fix was developed.
Adobe updated the Flash Player bulletin on Tuesday to include the release of updates for the AIR cross-platform runtime system.
Microsoft released over a dozen bulletins on Tuesday as part of its regular security update cycle. The updates resolve tens of vulnerabilities, including “Badlock,” a flaw in Windows and Samba that can be exploited for man-in-the-middle (MitM) and denial-of-service (DoS) attacks.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
Latest News
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
