Engineers at Adobe Systems have been busy after the company released patches to plug 17 critical security holes affecting Adobe Reader and Acrobat.
Among the fixes is a patch for a zero-day vulnerability that impacted not only Reader and Acrobat, but versions of Adobe Flash Player as well, on multiple operating systems. Earlier in June, attackers were seen using the bug to plant backdoor Trojans on vulnerable machines.
“[The June 29] update includes changes to resolve the misuse of this command,” blogged Steve Gottwals, group product manager for Adobe Reader. “We added functionality to block any attempts to launch an executable or other harmful objects by default. We also altered the way the existing warning dialog works to thwart the known social engineering attacks.”
When the feature is enabled, the user will get a warning message when opening attachments.
Almost all the vulnerabilities are known to leave users open to arbitrary code execution. The one exception is CVE-2010-2204, a remote memory corruption vulnerability that can cause programs to crash.
According to Adobe, arbitrary code execution has not been demonstrated, but may be possible.
All Cybertrucks manufactured between November 2023 and February 2025 recalled over trim that can fall…
As Musk guts US federal agencies, SEC issues summons over Elon's failure to disclose ownership…
Moonshot project Taara spun out of Google, uses lasers and not satellites to provide internet…
Pebble creator launches two new PebbleOS-based smartwatches with 30-day battery life, e-ink screens after OS…
Amazon loses appeal in Luxembourg's administrative court over 746m euro GDPR fine related to use…
Nvidia, xAI to participate in project backed by BlackRock, Microsoft to invest $100bn in AI…