Overview
On May 12, 2020, local time, Adobe officially released July’s security updates to fix multiple vulnerabilities in its various products, including Adobe DNG Software Development Kit (SDK) and Adobe Acrobat and Reader.
For details about the security update, visit the following link:
Vulnerability Description
Adobe DNG Software Development Kit (SDK)
Adobe has released security updates for Adobe DNG Software Development Kit (SDK) that address 12 vulnerabilities listed in the following table:
The following updates are rated as Priority 3. (For the definition of priorities, see Adobe Priority Rating System).
Vulnerability details are as follows:
Vulnerability Category | Vulnerability Impact | Severity Level | CVE ID |
Heap overflow | Arbitrary code execution | Critical | CVE-2020-9589 CVE-2020-9590 CVE-2020-9620 CVE-2020-9621 |
Out-of-bounds read | Information disclosure | Important | CVE-2020-9622 CVE-2020-9623 CVE-2020-9624 CVE-2020-9625 CVE-2020-9626 CVE-2020-9627 CVE-2020-9628 CVE-2020-9629 |
For details on the vulnerability impact and remediation, refer to the security bulletin at the following link:
Adobe Acrobat and Reader
Adobe has released security updates for Adobe Flash Player that address 24 vulnerabilities listed in the following table:
The following updates are rated as Priority 2. (For the definition of priorities, see Adobe Priority Rating System).
Vulnerability details are as follows:
Vulnerability Category | Vulnerability Impact | Severity Level | CVE ID |
Null pointer | Denial of service | Important | CVE-2020-9610 |
Heap overflow | Arbitrary code execution | Critical | CVE-2020-9612 |
Race condition | Security feature bypass | Critical | CVE-2020-9615 |
Out-of-bounds write | Arbitrary code execution | Critical | CVE-2020-9597 CVE-2020-9594 |
Security bypass | Security feature bypass | Critical | CVE-2020-9614 CVE-2020-9613 CVE-2020-9596 CVE-2020-9592 |
Stack exhaustion | Denial of service | Important | CVE-2020-9611 |
Out-of-bounds read | Information disclosure | Important | CVE-2020-9609 CVE-2020-9608 CVE-2020-9603 CVE-2020-9602 CVE-2020-9601 CVE-2020-9600 CVE-2020-9599 |
Buffer overflow | Arbitrary code execution | Critical | CVE-2020-9605 CVE-2020-9604 |
Use after free | Arbitrary code execution | Critical | CVE-2020-9607 CVE-2020-9606 |
Invalid memory access | Information disclosure | Important | CVE-2020-9598 CVE-2020-9595 CVE-2020-9593 |
For details on the vulnerability impact and remediation, refer to the security bulletin at the following link:
Solution
Adobe has officially released security updates to fix the preceding vulnerabilities. Users are advised to upgrade according to the time provided in the Adobe Priority Rating System.
For vulnerability details and remediation, please visit the preceding security bulletin links.
Adobe Priority Rating System
The Adobe Priority Rating System is a guideline to help our customers in managed environments prioritize Adobe security updates. We base our priority rankings on historical attack patterns for the relevant product, the type of vulnerability, the platform(s) affected, and any potential mitigations that are in place.
Rating | Description |
Priority 1 | This update resolves vulnerabilities being targeted, or which have a higher risk of being targeted, by exploit(s) in the wild for a given product version and platform. Adobe recommends administrators install the update as soon as possible (for example, within 72 hours). |
Priority 2 | This update resolves vulnerabilities in a product that has historically been at elevated risk. There are currently no known exploits. Based on previous experience, we do not anticipate exploits are imminent. As a best practice, Adobe recommends administrators install the update soon (for example, within 30 days). |
Priority 3 | This update resolves vulnerabilities in a product that has historically not been a target for attackers. Adobe recommends administrators install the update at their discretion. |
Statement
This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.
About NSFOCUS
NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company’s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.
NSFOCUS works with Fortune Global 500 companies, including four of the world’s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).
A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.