Adobe Patches Flaws in ColdFusion, After Effects, Digital Editions

Adobe has patched five vulnerabilities in its ColdFusion, After Effects and Digital Editions products, but none of the flaws appear too serious.

In ColdFusion 2016 and 2018, Adobe addressed three important-severity vulnerabilities related to insufficient input validation, DLL hijacking, and improper access control. The security holes can be exploited for DoS attacks, privilege escalation, and for obtaining information on the file system structure.

In Adobe After Effects for Windows and macOS, the company patched an important-severity out-of-bounds read vulnerability that can lead to information disclosure.

Finally, in its Digital Editions product, Adobe fixed an important information disclosure issue related to file enumeration.

Jason Troy, Raki Ben Hamouda, and researchers from imec-DistriNet at KU Leuven, Trend Micro’s Zero Day Initiative, and Secure D have been credited for reporting these security flaws.

Adobe says it has found no evidence to suggest that these vulnerabilities have been exploited in attacks, and based on the priority ratings assigned by the company they are unlikely to be exploited for malicious purposes anytime soon.

Related: Critical Flaw in Adobe Creative Cloud App Allows Hackers to Delete Files

Related: Oracle VirtualBox, Adobe Reader, Windows Hacked at Pwn2Own 2020

Related: Adobe Patches 42 Vulnerabilities Across Five Products

Related: Adobe Patches Vulnerabilities in Illustrator, Experience Manager

view counter

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:

Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *