Skip to main content

Adobe Patches Five Vulnerabilities, Three Critical

by Chris Brook on Thursday March 15, 2018

Contact Us
Free Demo
Chat

The bugs could be exploited to carry out remote code execution, the deletion of files, or information leakage.

Adobe patched five vulnerabilities in Flash Player, Connect, and Dreamweaver CC – three critical – this week as part of its regularly scheduled Patch Tuesday updates.

While the total number of fixes is far below average, especially compared to last month's 55 patches, the update remedies bugs that could be used to carry out remote code execution, the deletion of files, or information leakage.

Two of the critical vulnerabilities, perhaps unsurprisingly, were in Flash Player, Adobe’s ever-ubiquitous punching bag for hackers. Yuki Chen, a researcher on Qihoo’s 360 Vulcan Team, discovered the bugs, a use after free (CVE-2018-4919) and type confusion (CVE-2018-4920) vulnerability. If exploited both could lead to remote code execution in the context of the current user.

Windows, Macintosh, Linux, and Chrome OS users that still use Flash should update to the latest version, 29.0.0.113, to mitigate the vulnerabilities. Users still running 28.0.0.161 are still vulnerable however.

The other critical issue exists in Dreamweaver CC, Adobe’s popular website and web application development tool. According to Adobe, in version 18.0 and earlier of the software, an attacker could exploit a critical OS command injection vulnerability in the Dreamweaver URI handler on Windows. Similar to the Flash vulnerabilities, the attack could net a bad actor arbitrary code execution.

Hard to believe but according to Adobe's Security Bulletins and Advisories portal it's the first vulnerability to surface in Dreamweaver in more than 10 years. The last issues to affect the platform, two potential cross-site scripting vulnerabilities, were fixed back in January 2008.

The remaining two issues exist in Adobe Connect, the company’s web conferencing software. One bug, an unrestricted SWF file upload vulnerability (CVE-2018-4921) could be used to carry out a cross-site scripting attack. The other, another OS command injection vulnerability (CVE-2018-4923) could let an attacker perform an unintended arbitrary local file removal or forcibly uninstall the application. The bugs are rated important when it comes to severity and Adobe is encouraging users to update to version 9.7 of the software across all platforms to fix them.

Absent from this month’s update was an update for Adobe Reader, a popular target this week and every year at Pwn2Own, an annual hacking competition held in Vancouver alongside CanSecWest.

Last year two teams managed to take down Adobe Reader and combined other Windows kernel flaws into their attacks to achieve system-level privilege escalation. One won $50,000, another won $25,000. The maximum prize for taking down Reader this year is $90,000.

Tags:  Vulnerabilities Security News

Recommended Resources

The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention

All the essential information you need about DLP in one eBook.

6 Cybersecurity Thought Leaders on Data Protection
6 Cybersecurity Thought Leaders on Data Protection

Expert views on the challenges of today & tomorrow.

Digital Guardian Technical Overview
Digital Guardian Technical Overview

The details on our platform architecture, how it works, and your deployment options.