Adobe Software at Center of Two Vulnerability Disclosures

  /     /     /  
Publicated : 23/11/2024   Category : security


Adobe Software at Center of Two Vulnerability Disclosures


Newly discovered Photoshop and Ghostscript vulnerabilities allow remote code execution.



In a pair of apparently unrelated notices this week, remote execution vulnerabilities in two products built around Adobe image manipulation products were disclosed - as well as a security update for one of them.
In the first, Adobe announced updates to the Windows and MacOS versions of  Adobe Photoshop CC 2017 and 2018. According to the company, the
critical vulnerabilities
could allow remote code execution by unauthorized users. In announcing the updates, designated CVE-2018-12810 and CVE-2018-12811, Adobe describes the issues broadly while giving no details about the vulnerabilities or any known in the wild exploits.
Each of those two flaws was given a priority ranking of three, meaning that they are remediation for vulnerabilities in products that are not historically prime targets for threat exploits.
The second remote execution flaw announced today is much broader in potential impact: the vulnerability lies in the -dSAFER functionality of Ghostscript, an open source interpreter that allows programs such as GIMP (a popular open source alternative to Adobe Photoshop) to work with Adobes PostScript and PDF page description languages.
Because Ghostscript is used in both applications and websites to allow display and modification of .PDF and other Adobe format files, even a rapid update to the interpreter would likely take quite a long time to be fully deployed across the Internet.
In a post to loss-security
announcing the new vulnerabilities
, Tavis Ormandy, the researcher who discovered them, recommended that developers disable …PS, EPS, PDF and XPS coders in policy.xml by default.
Ormandy, who is on Googles Project Zero team, noted that he has found at least one exploit of the vulnerability in the wild, and that there are similar vulnerabilities that can be exploited with similar tactics. Further, he demonstrated that some of the methods for exploiting the vulnerabilities are trivial, requiring no advanced coding skills or security knowledge.
The new vulnerabilities are not the first to be found in -dSAFER. In a
related post
, Ormandy noted that he has posted -dSAFER sandbox escapes (methods allowing program execution to escape from the software sandbox designed to limit the effects of malicious code) in the past. 
This exploit has the potential for file system access leading to sensitive data leak and more as it can be the beachhead opportunity for a more comprehensive data breach, says Stephen Giguere, a sales engineer at Synopsys said.
Related Content:
Adobe Issues Emergency Patch for Flash Zero-Day
Attackers Shift From Adobe Flaws to Microsoft Products
Voice-Operated Devices, Enterprise Security & the Big Truck Attack
10 Threats Lurking on the Dark Web
 
Learn from the industrys most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for
more info


Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Adobe Software at Center of Two Vulnerability Disclosures