Adobe Patches 18 Critical Code Execution Flaws Across Five Products

Adobe announced on Tuesday that it has patched 18 critical code execution vulnerabilities in its After Effects, Illustrator, Premiere Pro, Premiere Rush, and Audition products.

In After Effects, Adobe fixed five critical out-of-bounds write, out-of-bounds read and heap overflow vulnerabilities that can be exploited for arbitrary code execution in the context of the targeted user.

The company also patched five critical code execution vulnerabilities — caused by buffer errors and memory corruption issues — in Illustrator.

Three out-of-bounds read and out-of-bounds write flaws that can lead to code execution were patched in the Windows and macOS versions of the Premiere Pro video editing software. The same types and the same number of bugs were also resolved in Premiere Rush, but different CVE identifiers have been assigned for each product.

Finally, two out-of-bounds write vulnerabilities that allow arbitrary code execution were addressed in the Adobe Audition audio recording and editing software.

All of these security holes were reported to Adobe by researchers from Fortinet and Trend Micro’s Zero Day Initiative (ZDI).

Adobe says it’s not aware of any attacks exploiting these vulnerabilities and while the flaws have been rated critical, their priority rating of “3” suggests that the company does not expect them to be exploited.

Adobe on Tuesday also announced the availability of updates for its Campaign Classic marketing tool. The updates patch an important severity issue that can lead to information disclosure.

Earlier this month, Adobe informed customers that it released patches for vulnerabilities affecting Flash Player, Framemaker and Experience Manager.

Related: Adobe Patches Flaws in ColdFusion, After Effects, Digital Editions

Related: Adobe Patches 22 Vulnerabilities in Bridge, Illustrator

Related: Adobe Patches 36 Vulnerabilities in Acrobat, DNG SDK

Related: Researcher Finds Memory Corruption Vulnerabilities in Several Adobe Products

view counter

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:

Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *