Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Adobe Patches ‘Critical’ Security Flaws in Illustrator, After Effects

Software maker Adobe on Tuesday shipped urgent security updates to fix code execution vulnerabilities in the widely deployed Illustrator and After Effects products.

Software maker Adobe on Tuesday shipped urgent security updates to fix code execution vulnerabilities in the widely deployed Illustrator and After Effects products.

The patches, scheduled as part of Adobe’s Patch Tuesday release cycle, address a range of arbitrary code execution and memory leak vulnerabilities that could expose data to malicious hacker attacks.

The most serious of the vulnerabilities was addressed in Adobe Illustrator, the popular vector graphics design program available for both macOS and Windows systems.

In an advisory, Adobe rated the Illustrator flaw as “critical” with a CVSS base score of 7.8. The company described the CVE-2022-23187 bug as a buffer overflow affecting Illustrator 2022 version 26.0.3 (and earlier versions) on both WIndows and macOS machines.

Adobe is strongly urging users to upgrade to Illustrator 2022 version 26.1.0.

[ READ: Adobe Joins Security Patch Tuesday Frenzy ]

The San Jose, Calif.-based Adobe issued a separate alert to warn of at least four critical flaws haunting users of After Effects, another popular software product used in motion graphics creative projects.

The quartet of bugs are all described as stack-based buffer overflows that could allow computer takeover attacks.

Advertisement. Scroll to continue reading.

“Successful exploitation could lead to arbitrary code execution in the context of the current user,” Adobe warned, before urging users to apply available patches on both Windows and macOS systems.

A third Adobe bulletin provides details on a solitary memory leak issue in Adobe Photoshop.  The Photoshop bug, rated “important,” is available on both macOS and Windows platforms.

Adobe said it had no information to suggest any of these bugs were exploited in the wild prior to the availability of patches.

Related: Adobe Joins Security Patch Tuesday Frenzy

Related: Adobe Warns of Critical Flaws in Magento, Connect

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders.

Register

People on the Move

Former federal CISO Chris DeRusha has been appointed Director of Global Public Sector Compliance at Google Cloud.

Cybersecurity veteran Kevin Mandia has been named General Partner of Ballistic Ventures.

Mark Sutton, CISO at Bain Capital, has joined the Board of Directors at AI security firm Harmonic Security.

More People On The Move

Expert Insights