![]() ![]() To fix these vulnerabilities, users should upgrade to Acrobat DC and Acrobat Reader DC to version 2018.011.20063, Acrobat 2017 and DC 2017 to version 2017.011.30102, and Acrobat DC Classic 2015 and Acrobat Reader DC Classic to version 2015 2015.006.30452. The information disclosure vulnerabilities were disclosed by Check Point Software, Cybellum Technologies LTD, and via via Trend Micro's Zero Day Initiative. It is not very, very useful to call software very very old, unless suggesting that people dodge it (like a rat running under a tablecloth at a restaurant) based solely on age. ![]() The link youve kindly posted (thank you) now points to nothing. The code execution vulnerability (CVE-2018-12848) was reported to Adobe by Check Point Software. try67 : We need the updates for Adobe Acrobat Pro 7.0.0 on Macintosh. The APSB18-34 security bulletin details how these updates resolve an Out-of-bounds write vulnerability that could lead to code execution, while the other six are out-of-bounds read vulnerabilities that could lead to information disclosure. It looks like they missed one, as Adobe released today an out-of-band security update for a critical vulnerability in Adobe Acrobat and Adobe Reader. ![]() If you want, you may also manually trigger the update early by opening the application and going to Help > Check for Updates. This update will be automatically pushed to all existing installations of Acrobat and Reader. Last week Adobe released fixed 6 critical updates in their September 2018 monthly Patch Tuesday. Adobe Acrobat DC and Reader DC official update (19.021.20049) containing the fix for this issue is now available. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |