Adobe Patches Critical Code Execution Flaws in Bridge, Photoshop, Prelude
Adobe informed customers on Tuesday that it has patched several critical code execution vulnerabilities in its Bridge, Photoshop and Prelude products.
In the Windows and macOS versions of Bridge, Adobe fixed three critical out-of-bounds read and out-of-bounds write vulnerabilities that can be exploited by an attacker to execute arbitrary code in the context of the targeted user.
In Photoshop CC for Windows and macOS, Adobe resolved five critical flaws, including two out-of-bounds read bugs and three out-of-bounds write issues, all of which can be exploited for arbitrary code execution.
In its Prelude video logging software, the company fixed two out-of-bounds read and two out-of-bounds write vulnerabilities. All of them have been rated critical and all of them can be exploited for arbitrary code execution.
All of the security holes patched this week in Bridge, Photoshop and Prelude were reported to Adobe by Mat Powell of Trend Micro’s Zero Day Initiative (ZDI). Earlier this year, Powell was credited by Adobe for reporting memory corruption bugs in Character Animation, Premiere Rush, Premiere Pro, and Audition.
Adobe has also published an advisory to inform customers that it has patched an important severity directory traversal vulnerability in its Reader Mobile product. Exploitation of the weakness can lead to information disclosure.
Adobe says it’s not aware of any attacks exploiting these vulnerabilities and based on the priority ratings it has assigned the company does not expect them to be exploited.
Earlier this month, Adobe announced patching over a dozen vulnerabilities in its Creative Cloud, Media Encoder, Genuine Service, ColdFusion and Download Manager products.