Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.
- Adobe Acrobat Reader is a free, widely used software application from Adobe that allows users to view, print, sign, share, and annotate PDF documents.
- Adobe InDesign is desktop publishing software used to create, pre-flight, and publish professional page layouts for print and digital media.
- Adobe InCopy is professional writing and editing software that integrates directly with Adobe InDesign to enable collaborative workflows between editors, copywriters, and designers.
- Adobe Experience Manager (AEM) Screens is a cloud-based digital signage solution that extends AEM’s content management capabilities to physical, in-venue displays.
- Adobe FrameMaker is a powerful, industry-standard desktop publishing software designed for authoring, managing, and publishing complex, long-form technical documentation.
- Adobe Connect is a secure, highly customizable web conferencing and virtual training platform used for webinars, online meetings, and e-learning.
- Adobe ColdFusion is a commercial rapid web application development platform and server-side technology used to build, deploy, and manage dynamic websites and internet applications.
- Adobe Bridge is a free, powerful digital asset management (DAM) application designed to organize, browse, locate, and view creative assets.
- Adobe Photoshop is software for raster image editing, graphic design, and digital art.
- The Adobe DNG Software Development Kit (SDK) is a set of tools and libraries for developers to read, write, and manipulate Digital Negative (DNG) files, an open, lossless raw image format.
- Adobe Illustrator is vector graphics software used by designers to create scalable, high-resolution artwork such as logos, icons, illustrations, and typography.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
–
Read More – Cyber Security Advisories – MS-ISAC