The security update from Adobe for February 2020, covers a total of 42 vulnerabilities in products Framemaker, Acrobat and Reader, Flash Player, Digital Editions and Experience Manager.
Most of the vulnerabilities (21) affect the version of the Framemaker document editor for Windows. The most serious issues are characterized as critical. Vulnerabilities can lead to arbitrary code execution.
The vulnerabilities were reported to the company through the Trend Micro Zero Day Initiative by a researcher with the code name “Kdot”.
In addition, Adobe is facing 17 defects in versions of Acrobat and Reader for Windows and macOS.
The IT company is fixing critical memory corruption issues that attackers can exploit to execute arbitrary code on vulnerable systems and privilege escalation errors that can allow an attacker to write arbitrary files on the system. The other flaws in Acrobat and Reader products have been characterized as moderate gravity memory leaks and high gravity information leakage vulnerabilities.
The defects were reported to Adobe by independent experts and researchers from Qihoo 360, Tencent, Renmin University of China, Cisco Talos, the Chinese Academy of Sciences, Baidu and McAfee.
Another serious bug experienced by Adobe was an arbitrary code execution error in Flash Player, whose successful exploitation could lead to arbitrary code execution.
Adobe has also faced two vulnerabilities in digital versions, including a critical command injection bug and a major information leak.
Another major denial-of-service (DoS) issue affecting versions 6.5 and 6.4 of Adobe Experience Manager was also addressed by the company.
As Adobe has confirmed, it has not discovered any exploitation of these vulnerabilities in reality.