Bugs patched by Adobe
Adobe issued four patches to fix 29 security bugs in its first batch of
security patches for 2023 across its Acrobat and Reader, InDesign,
InCopy, and Dimension software. The firm is unaware of any exploits
in the wild for any of these bugs.
Acrobat and Reader software update
The Acrobat and Reader software update remediates 15 critical
and important bugs. These would expose Windows and macOS
users to application denial-of-service (DoS), arbitrary code
execution, privilege escalation, and memory leak.
InDesign
InDesign has six critical and important bugs. They could enable
arbitrary code execution, application denial-of-service (DoS), and memory
leak attacks. The bugs impact users on Windows and macOS
platforms.
InCopy
There are six bugs in InCopy. They could expose Windows and
macOS users to arbitrary code execution and memory leaks.
Dimension
Two bugs were found in Dimension. These bugs could expose Windows and
macOS users to arbitrary code execution and memory leaks in the context
of the current user.
Corrective action
Adobe has made the latest product versions available to end users. It
urges users to update their software installations to the newest
versions.
Impacted
products and versions - Acrobat DC - 22.003.20282 (Win), 22.003.20281 (Mac),
and prior versions
- Acrobat Reader DC - 22.003.20282 (Win), 22.003.20281 (Mac),
and prior versions
- Acrobat 2020 - 20.005.30418 and prior versions
- Acrobat Reader 2020 - 20.005.30418 and prior versions
- Acrobat DC - 22.003.20310
- Acrobat Reader DC - 22.003.20310
- Acrobat 2020 - 20.005.30436
- Acrobat Reader 2020 - 20.005.30436
A vulnerability [CVE-2023-46033] has been identified in multiple D-Link routers which could allow spammers to perform certain unauthorized actions in the context of an affected system.