A little more than a week after forgoing March's Patch Tuesday hullabaloo, Adobe has emitted fixes for dozens of security flaws in its applications.
The ever-vulnerable Reader and Acrobat on Windows and macOS require patching for 13 CVE-listed holes, nine of which can be exploited to gain malicious code execution on vulnerable machines. The others are privilege escalation and information leakage.
Viettel Cyber Security, Shearwater Solutions, STAR Labs, Tencent Security Xuanwu Lab, SEFCOM Lab, Arizona State University, Renmin University of China, and TCA/SKLCS Institute of Software Chinese Academy of Sciences were thanksed for finding and reporting the programming blunders.
In addition to tackling the Reader and Acrobat bugs, Adobe pushed out patches for 22 bugs in Windows and macOS Photoshop – 16 of which allow for malicious code execution – and one privilege escalation hole in the aptly-named Adobe Genuine Integrity Service on Windows.
These discoveries were credited to infosec researchers working with the Trend Micro Zero Day Initiative (ZDI), 小鸡帮, and Fortinet.
These discoveries were credited to Mikhail Egorov, the ZDI, and Venustech ADLab.
Thus far, there have been no reports of active exploitation of the bugs.
Meanwhile, folks running Trend Micro Apex One and Office Scan security tools will want to make sure they have the latest updates for those apps.
Five CVE-listed bugs, two of which are being targeted in the wild, need to be patched. These bugs range from remote malicious code execution to giving attackers the ability to delete any file on a system, or overwrite any data. The two bugs exploited by hackers are described as:
CVE-2020-8467: CVSS 9.1 (CRITICAL) – A migration tool component of Trend Micro Apex One and OfficeScan contains a vulnerability which could allow remote attackers to execute arbitrary code on affected installations (RCE). An attempted attack requires user authentication.
CVE-2020-8468: CVSS 8.0 (HIGH) – Trend Micro Apex One and OfficeScan agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication.
The programming blunders were found by Trend Micro Research.
"Exploiting these type of vulnerabilities generally require that an attacker has access (physical or remote) to a vulnerable machine," Trend said of the flaws.
"Customers are encouraged to review and ensure the product servers and management consoles are restricted to trusted networks and/or users as appropriate." And, also, don't forget to patch as soon as possible. ®