In trying times like these, it's reassuring to know you can still get pwned five different ways by Adobe Illustrator files

Make sure you update your software with these critical fixes

Adobe has emitted fixes for multiple remote code execution holes in Illustrator and its Bridge code.

Those who rely on Adobe Illustrator version 24.0.2 for Windows, or earlier builds, will want to make sure they install APSB20-20, the latest round of security fixes for the drawing tool.

"This update resolves critical vulnerabilities that could lead to arbitrary code execution in the context of current user," Adobe says of the patch.

The update closes up five CVE-listed security flaws, all considered critical risks. The bugs, each described as memory corruption errors, would allow remote code execution on a vulnerable machine.

In each case, the victim would need to open a maliciously crafted Illustrator document, most likely as an email attachment or download, to trigger exploitation. So far there are no reports of any active attacks in the wild, although now that the patches have been disclosed there is a better chance they will be reverse-engineered and targeted.

Kushal Arvind Shah, of Fortiguard Labs, took credit for discovering and reporting the programming blunders, designated CVE-2020-9570 through CVE-2020-9574.

While the Illustrator fixes are going to be the more important of the patches, just due to the size of the user base, those running Adobe Bridge (a file management tool described as "Media Asset Management") will also want to look for APSB 20-19, an update that addresses a whopping 17 CVE-listed vulnerabilities.

A hand taking an eraser to a hard drive

Adobe debuts disk-cleaning tool cleverly disguised as an arbitrary file deletion bug in Creative Cloud on Windows


Users will be able to get the Bridge fixes by updating their copies of Creative Cloud on both Windows and macOS machines.

Those flaws range from buffer and heap overflow errors to memory corruption bugs, out of bounds read and write errors, and use-after-free() vulnerabilities. Fourteen of the 17 flaws can be exploited to achieve remote code execution. The other three would lead to information disclosure.

Adobe considers the fixes to be critical, so users and admins would be well-advised to test and install the updates as soon as possible.

Mat Powell of Trend Micro's Zero Day Initiative, got credit for discovering the lion's share of the bugs – 15 of the 17 were found and reported to Adobe by Powell. The other two were credited to Francis Provencher, also of the Zero Day Initiative, and an anonymous bod who reported the flaws via the ZDI.

Users and admins should have plenty of time to test and install the Adobe fixes, at least as far as scheduling goes. We have a good two weeks before the next edition of Patch Tuesday is slated to drop, so barring a serious security bug that warrants an out-of-band fix, we are not due for any updates from Microsoft, Adobe, Intel, or SAP any time soon. ®

Narrower topics

Other stories you might like

  • GPL legal battle: Vizio told by judge it will have to answer breach-of-contract claims
    Fine-print crucially deemed contractual agreement as well as copyright license in smartTV source-code case

    The Software Freedom Conservancy (SFC) has won a significant legal victory in its ongoing effort to force Vizio to publish the source code of its SmartCast TV software, which is said to contain GPLv2 and LGPLv2.1 copyleft-licensed components.

    SFC sued Vizio, claiming it was in breach of contract by failing to obey the terms of the GPLv2 and LGPLv2.1 licenses that require source code to be made public when certain conditions are met, and sought declaratory relief on behalf of Vizio TV owners. SFC wanted its breach-of-contract arguments to be heard by the Orange County Superior Court in California, though Vizio kicked the matter up to the district court level in central California where it hoped to avoid the contract issue and defend its corner using just federal copyright law.

    On Friday, Federal District Judge Josephine Staton sided with SFC and granted its motion to send its lawsuit back to superior court. To do so, Judge Staton had to decide whether or not the federal Copyright Act preempted the SFC's breach-of-contract allegations; in the end, she decided it didn't.

    Continue reading
  • US brings first-of-its-kind criminal charges of Bitcoin-based sanctions-busting
    Citizen allegedly moved $10m-plus in BTC into banned nation

    US prosecutors have accused an American citizen of illegally funneling more than $10 million in Bitcoin into an economically sanctioned country.

    It's said the resulting criminal charges of sanctions busting through the use of cryptocurrency are the first of their kind to be brought in the US.

    Under the United States' International Emergency Economic Powers Act (IEEA), it is illegal for a citizen or institution within the US to transfer funds, directly or indirectly, to a sanctioned country, such as Iran, Cuba, North Korea, or Russia. If there is evidence the IEEA was willfully violated, a criminal case should follow. If an individual or financial exchange was unwittingly involved in evading sanctions, they may be subject to civil action. 

    Continue reading
  • Meta hires network chip guru from Intel: What does this mean for future silicon?
    Why be a customer when you can develop your own custom semiconductors

    Analysis Here's something that should raise eyebrows in the datacenter world: Facebook parent company Meta has hired a veteran networking chip engineer from Intel to lead silicon design efforts in the internet giant's infrastructure hardware engineering group.

    Jon Dama started as director of silicon in May for Meta's infrastructure hardware group, a role that has him "responsible for several design teams innovating the datacenter for scale," according to his LinkedIn profile. In a blurb, Dama indicated that a team is already in place at Meta, and he hopes to "scale the next several doublings of data processing" with them.

    Though we couldn't confirm it, we think it's likely that Dama is reporting to Alexis Bjorlin, Meta's vice president of infrastructure hardware who previously worked with Dama when she was general manager of Intel's Connectivity group before serving a two-year stint at Broadcom.

    Continue reading

Biting the hand that feeds IT © 1998–2022