Updates released on Tuesday by Adobe for Flash Player, Reader and Acrobat address a significant number of vulnerabilities that expose the users of these products to hacker attacks.
As promised last week, Adobe updated the Windows and Mac versions of Reader and Acrobat to resolve a series of critical vulnerabilities that can potentially allow malicious actors to take control of affected systems.
A total of 56 vulnerabilities have been patched with the release of Adobe Acrobat and Reader 11.0.13 and 10.1.16, nearly half of which represent various methods that can be used to bypass restrictions on JavaScript API execution.
The list of patched flaws also includes security bypass vulnerabilities that could lead to information disclosure, memory leak issues, and various memory corruption bugs that can be exploited for arbitrary code execution. Adobe says it’s not aware of any instances in which these vulnerabilities have been exploited for malicious purposes.
Researchers from HP’s Zero Day Initiative (ZDI) have been credited for finding and reporting a majority of the vulnerabilities fixed in Reader and Acrobat. The work of experts from Cure53, Vectra Networks, VeriSign iDefense Labs, Trend Micro, MWR Labs, and the Nanyang Technological University in Singapore has also been acknowledged by Adobe.
As for Flash Player, Adobe has addressed a total of 13 security issues, none of which appear to have been exploited in the wild.
According to Adobe, Flash Player 19.0.0.207 fixes use-after-free, buffer overflow and other memory corruption flaws that could lead to arbitrary code execution. The latest version also resolves a vulnerability that could be exploited to bypass the same-origin policy (SOP).
In addition to the patched security bugs, Flash Player 19.0.0.207 also includes a defense-in-depth feature in the Flash broker API, Adobe said in its advisory.
Independent researchers and employees of Tencent, Qihoo 360, Alibaba, and Google have been credited for reporting the issues.
Adobe has already released more than 15 updates for Flash Player this year, including ones designed to address zero-day vulnerabilities exploited in the wild before the patches were made available.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Zyxel Firewalls Hacked by Mirai Botnet
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
- New Honeywell OT Cybersecurity Solution Helps Identify Vulnerabilities, Threats
- Rheinmetall Says Military Business Not Impacted by Ransomware Attack
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
