Adobe’s Patch Tuesday updates for March 2019 address critical vulnerabilities discovered by researchers in the company’s Photoshop CC and Digital Editions products.
In the Digital Editions ebook reader software Adobe fixed a heap overflow that can be exploited to execute arbitrary code in the context of the current user (CVE-2019-7095). The flaw was reported to Adobe by a researcher who uses the online moniker albalawi-s.
The Photoshop CC updates for Windows and macOS also resolve a heap overflow bug that can lead to arbitrary code execution in the context of the current user (CVE-2019-7094). This weakness was reported to Adobe by Francis Provencher through Trend Micro’s Zero Day Initiative.
Adobe says there is no evidence that either of these flaws have been exploited in the wild. While both security holes have been classified by the company as critical, they have been assigned a priority rating of “3,” which indicates that they are unlikely to be exploited in attacks.
Cybersecurity testing firm Swascan revealed on Monday that its researchers had identified five vulnerabilities in an Adobe sandbox service hosted at adobesandbox.com.
The company has not shared any details about the flaws and only mentioned that one has been classified as “high,” two as “medium” and two as having “low” severity. The company said the vulnerabilities, if exploited, could “easily impact the Integrity, Availability and Confidentiality of the systems.”
Adobe told SecurityWeek that the vulnerabilities identified by Swascan impact an environment provided by the company to customers for demonstration purposes – to test features, etc. The company says this environment is not related to the Adobe Reader sandbox, which is designed to protect users against malicious PDF files.
Earlier this month, Adobe updated its ColdFusion product to address a critical vulnerability that had been exploited in the wild.
Related: Adobe Patches Vulnerabilities in Flash Player, ColdFusion
Related: Adobe Patches Flash Zero-Day Exploited in Targeted Attacks
Related: Adobe Patches Flash Zero-Day Exploited by North Korean Hackers

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
- Cybercriminals, APT Exploited Telerik Vulnerability in Attacks on US Government Agency
- US Charges Two Men Over Use of Hacked Law Enforcement Database for Doxing
- Chinese Cyberspies Hacked DLP Company Serving Military, Government Orgs
- Data Security Firm Rubrik Targeted With GoAnywhere Zero-Day Exploit
Latest News
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- New York Man Arrested for Running BreachForums Cybercrime Website
- Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder
- Latitude Financial Services Data Breach Impacts 300,000 Customers
- US Government Warns Organizations of LockBit 3.0 Ransomware Attacks
- New ‘Trigona’ Ransomware Targets US, Europe, Australia
- New Espionage Group ‘YoroTrooper’ Targeting Entities in European, CIS Countries
