Adobe on Tuesday rolled out a big batch of security updates for its flagship Acrobat and Reader software, patching at least 30 vulnerabilities affecting Windows and macOS installations.
The software maker documented the 30 security defects in a critical-level advisory and warned that successful exploitation could lead to arbitrary code execution, memory leaks, security feature bypass and application denial-of-service attacks.
Adobe said affected software include Acrobat DC, Acrobat Reader DC, Acrobat 2020 and Acrobat Reader 2020. The company described most of the bugs as memory safety issues and said it was not aware of any exploits in the wild.
The Acrobat and Reader fixes headline a busy Patch Tuesday at Adobe. The company separately shipped an urgent update covering a trio of security vulnerabilities in the Adobe Commerce and Magento Open Source.
“Successful exploitation could lead to arbitrary code execution, privilege escalation and arbitrary file system read,” Adobe cautioned.
The Adobe PSIRT team also updated the Adobe Dimension software to cover three flaws that expose Windows and macOS users to arbitrary code execution and memory leaks.
Related: Adobe Releases New Patches for Exploited ColdFusion Vulnerabilities
Related: Two New Adobe ColdFusion Vulnerabilities Exploited in Attacks
Related: Adobe Patch Tuesday: Critical Flaws Haunt InDesign, ColdFusion
Related: Adobe Warns of ‘Very Limited Attacks’ Exploiting ColdFusion Zero-Day