{"id":9216,"date":"2019-08-26T02:44:32","date_gmt":"2019-08-26T02:44:32","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9216"},"modified":"2019-08-26T02:44:32","modified_gmt":"2019-08-26T02:44:32","slug":"adobe-security-bulletins-for-august-2019-security-updates-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/","title":{"rendered":"Adobe Security Bulletins for August 2019 Security Updates Threat Alert"},"content":{"rendered":"<h2><strong>Overview<\/strong><\/h2>\n<p>On August 13, 2019, local time, Adobe officially released August&#8217;s security updates to fix multiple vulnerabilities in its various products, including Adobe Photoshop CC\u202f, Adobe Experience Manager, Adobe Acrobat and Reader, Adobe Creative Cloud Desktop\u202fApplication, Adobe Prelude\u202fCC, Adobe Premiere Pro\u202fCC, Adobe Character Animator CC, and Adobe After Effects CC.<!--more--><\/p>\n<p>For details about the security bulletins and advisories, visit the following link:<\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security.html\">https:\/\/helpx.adobe.com\/security.html<\/a><\/p>\n<h2><strong>Fixed Vulnerabilities<\/strong><\/h2>\n<h3><strong>Adobe Photoshop CC\u202f<\/strong><\/h3>\n<p>Adobe has released security updates for Adobe Photoshop CC that address 34 vulnerabilities listed in the following table:<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"23%\">Vulnerability Category<\/td>\n<td width=\"20%\">Vulnerability Impact<\/td>\n<td width=\"14%\">Severity Level<\/td>\n<td width=\"41%\">CVE ID<\/td>\n<\/tr>\n<tr>\n<td width=\"23%\">Heap overflow<\/td>\n<td width=\"20%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Critical<\/td>\n<td width=\"41%\">CVE-2019-7978<\/p>\n<p>CVE-2019-7980<\/p>\n<p>CVE-2019-7985<\/p>\n<p>CVE-2019-7990<\/p>\n<p>CVE-2019-7993<\/td>\n<\/tr>\n<tr>\n<td width=\"23%\">Type confusion<\/td>\n<td width=\"20%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Critical<\/td>\n<td width=\"41%\">CVE-2019-7969<\/p>\n<p>CVE-2019-7970<\/p>\n<p>CVE-2019-7971<\/p>\n<p>CVE-2019-7972<\/p>\n<p>CVE-2019-7973<\/p>\n<p>CVE-2019-7974<\/p>\n<p>CVE-2019-7975<\/td>\n<\/tr>\n<tr>\n<td width=\"23%\">Out-of-bounds read<\/td>\n<td width=\"20%\">Memory leak<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-7977<\/p>\n<p>CVE-2019-7981<\/p>\n<p>CVE-2019-7987<\/p>\n<p>CVE-2019-7991<\/p>\n<p>CVE-2019-7992<\/p>\n<p>CVE-2019-7995<\/p>\n<p>CVE-2019-7996<\/p>\n<p>CVE-2019-7997<\/p>\n<p>CVE-2019-7998<\/p>\n<p>CVE-2019-7999<\/p>\n<p>CVE-2019-8000<\/p>\n<p>CVE-2019-8001<\/td>\n<\/tr>\n<tr>\n<td width=\"23%\">Command injection<\/td>\n<td width=\"20%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Critical<\/td>\n<td width=\"41%\">CVE-2019-7968<\/p>\n<p>CVE-2019-7989<\/td>\n<\/tr>\n<tr>\n<td width=\"23%\">Out-of-bounds write<\/td>\n<td width=\"20%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Critical<\/td>\n<td width=\"41%\">CVE-2019-7976<\/p>\n<p>CVE-2019-7979<\/p>\n<p>CVE-2019-7982<\/p>\n<p>CVE-2019-7983<\/p>\n<p>CVE-2019-7984<\/p>\n<p>CVE-2019-7986<\/p>\n<p>CVE-2019-7988<\/p>\n<p>CVE-2019-7994<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<p>Photoshop CC version &lt;= 19.1.8<\/p>\n<p>Photoshop CC version &lt;= 20.0.5<\/p>\n<ul>\n<li>Unaffected versions:<\/li>\n<\/ul>\n<p>Photoshop CC version 19.1.9<\/p>\n<p>Photoshop CC version 20.0.6<\/p>\n<p>For details about the vulnerability impact and remediation, refer to the security bulletin from the following link:<\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security\/products\/photoshop\/apsb19-44.html\">https:\/\/helpx.adobe.com\/security\/products\/photoshop\/apsb19-44.html<\/a><\/p>\n<h3><strong>Adobe Experience Manager<\/strong><\/h3>\n<p>Adobe has released security updates for Adobe Experience Manager that address one vulnerability listed in the following table:<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"25%\">Vulnerability Category<\/td>\n<td width=\"25%\">Vulnerability Impact<\/td>\n<td width=\"25%\">Severity Level<\/td>\n<td width=\"24%\">CVE ID<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Authentication bypass<\/td>\n<td width=\"25%\">Remote code execution<\/td>\n<td width=\"25%\">Critical<\/td>\n<td width=\"24%\">CVE-2019-7964<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<p>Adobe Experience Manager 6.5 and 6.4<\/p>\n<ul>\n<li>Unaffected versions:<\/li>\n<\/ul>\n<p>The hotfix of Adobe Experience Manager 6.5, HOTFIX 30379 for AEM 6.5.0<\/p>\n<p>https:\/\/www.adobeaemcloud.com\/content\/packageshare\/tools\/login.html?resource=%2Fcontent%2Fmarketplace%2FmarketplaceProxy.html%3FpackagePath%3D%2Fcontent%2Fcompanies%2Fpublic%2Fadobe%2Fpackages%2Fcq650%2Fhotfix%2Fcq-6.5.0-hotfix-30379&#038;$$login$$=%24%24login%24%24<\/p>\n<p>The hotfix of Adobe Experience Manager 6.4, HOTFIX 30379 for AEM 6.4.0<\/p>\n<p>https:\/\/www.adobeaemcloud.com\/content\/packageshare\/tools\/login.html?resource=%2Fcontent%2Fmarketplace%2FmarketplaceProxy.html%3FpackagePath%3D%2Fcontent%2Fcompanies%2Fpublic%2Fadobe%2Fpackages%2Fcq640%2Fhotfix%2Fcq-6.4.0-hotfix-30379&#038;$$login$$=%24%24login%24%24<\/p>\n<p>For details about the vulnerability impact and remediation, refer to the security bulletin from the following link:<\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security\/products\/experience-manager\/apsb19-42.html\">https:\/\/helpx.adobe.com\/security\/products\/experience-manager\/apsb19-42.html<\/a><\/p>\n<h3><strong>Adobe Acrobat and Reader<\/strong><\/h3>\n<p>Adobe has released security updates for Adobe Flash Player that address multiple vulnerabilities listed in the following table:<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"22%\">Vulnerability Category<\/td>\n<td width=\"21%\">Vulnerability Impact<\/td>\n<td width=\"14%\">Severity Level<\/td>\n<td width=\"41%\">CVE ID<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Out-of-bounds read<\/td>\n<td width=\"21%\">Information disclosure<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-8077<\/p>\n<p>CVE-2019-8094<\/p>\n<p>CVE-2019-8095<\/p>\n<p>CVE-2019-8096<\/p>\n<p>CVE-2019-8102<\/p>\n<p>CVE-2019-8103<\/p>\n<p>CVE-2019-8104<\/p>\n<p>CVE-2019-8105<\/p>\n<p>CVE-2019-8106<\/p>\n<p>CVE-2019-8002<\/p>\n<p>CVE-2019-8004<\/p>\n<p>CVE-2019-8005<\/p>\n<p>CVE-2019-8007<\/p>\n<p>CVE-2019-8010<\/p>\n<p>CVE-2019-8011<\/p>\n<p>CVE-2019-8012<\/p>\n<p>CVE-2019-8018<\/p>\n<p>CVE-2019-8020<\/p>\n<p>CVE-2019-8021<\/p>\n<p>CVE-2019-8032<\/p>\n<p>CVE-2019-8035<\/p>\n<p>CVE-2019-8037<\/p>\n<p>CVE-2019-8040<\/p>\n<p>CVE-2019-8043<\/p>\n<p>CVE-2019-8052<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Out-of-bounds write<\/td>\n<td width=\"21%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-8098<\/p>\n<p>CVE-2019-8100<\/p>\n<p>CVE-2019-7965<\/p>\n<p>CVE-2019-8008<\/p>\n<p>CVE-2019-8009<\/p>\n<p>CVE-2019-8016<\/p>\n<p>CVE-2019-8022<\/p>\n<p>CVE-2019-8023<\/p>\n<p>CVE-2019-8027<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Command injection<\/td>\n<td width=\"21%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-8060<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Use after free<\/td>\n<td width=\"21%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-8003<\/p>\n<p>CVE-2019-8013<\/p>\n<p>CVE-2019-8024<\/p>\n<p>CVE-2019-8025<\/p>\n<p>CVE-2019-8026<\/p>\n<p>CVE-2019-8028<\/p>\n<p>CVE-2019-8029<\/p>\n<p>CVE-2019-8030<\/p>\n<p>CVE-2019-8031<\/p>\n<p>CVE-2019-8033<\/p>\n<p>CVE-2019-8034<\/p>\n<p>CVE-2019-8036<\/p>\n<p>CVE-2019-8038<\/p>\n<p>CVE-2019-8039<\/p>\n<p>CVE-2019-8047<\/p>\n<p>CVE-2019-8051<\/p>\n<p>CVE-2019-8053<\/p>\n<p>CVE-2019-8054<\/p>\n<p>CVE-2019-8055<\/p>\n<p>CVE-2019-8056<\/p>\n<p>CVE-2019-8057<\/p>\n<p>CVE-2019-8058<\/p>\n<p>CVE-2019-8059<\/p>\n<p>CVE-2019-8061<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Heap overflow<\/td>\n<td width=\"21%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-7832<\/p>\n<p>CVE-2019-8014<\/p>\n<p>CVE-2019-8015<\/p>\n<p>CVE-2019-8041<\/p>\n<p>CVE-2019-8042<\/p>\n<p>CVE-2019-8046<\/p>\n<p>CVE-2019-8049<\/p>\n<p>CVE-2019-8050<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Buffer overflow<\/td>\n<td width=\"21%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-8048<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Double free<\/td>\n<td width=\"21%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-8044<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Integer overflow<\/td>\n<td width=\"21%\">Information disclosure<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-8099<\/p>\n<p>CVE-2019-8101<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Internal IP disclosure<\/td>\n<td width=\"21%\"><\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-8097<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Type confusion<\/td>\n<td width=\"21%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-8019<\/td>\n<\/tr>\n<tr>\n<td width=\"22%\">Untrusted pointer dereference<\/td>\n<td width=\"21%\">Arbitrary code execution<\/td>\n<td width=\"14%\">Important<\/td>\n<td width=\"41%\">CVE-2019-8006<\/p>\n<p>CVE-2019-8017<\/p>\n<p>CVE-2019-8045<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<table width=\"85%\">\n<tbody>\n<tr>\n<td width=\"25%\">Product<\/td>\n<td width=\"44%\">Affected Version<\/td>\n<td width=\"29%\">Platform<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Adobe DC<\/td>\n<td width=\"44%\">&lt;= 2019.012.20034<\/td>\n<td width=\"29%\">macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Acrobat Reader DC<\/td>\n<td width=\"44%\">&lt;= 2019.012.20034<\/td>\n<td width=\"29%\">macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Adobe DC<\/td>\n<td width=\"44%\">&lt;=2019.012.20035<\/td>\n<td width=\"29%\">Windows<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Acrobat Reader DC<\/td>\n<td width=\"44%\">&lt;=2019.012.20035<\/td>\n<td width=\"29%\">Windows<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Here, only affected versions of the Continuous series are listed. For affected versions of other series, see the official bulletin.<\/p>\n<ul>\n<li>Unaffected versions:<\/li>\n<\/ul>\n<p>Acrobat DC Version == 2019.012.20036<\/p>\n<p>Acrobat Reader DC Version == 2019.012.20036<\/p>\n<p>For details about the vulnerability impact and remediation, refer to the security bulletin from the following link:<\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb19-41.html\">https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb19-41.html<\/a><\/p>\n<h3>Adobe Creative Cloud Desktop\u202fApplication<\/h3>\n<p>Adobe has released security updates for Adobe Creative Cloud Desktop\u202fApplication that address four vulnerabilities listed in the following table:<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"25%\">Vulnerability Category<\/td>\n<td width=\"25%\">Vulnerability Impact<\/td>\n<td width=\"25%\">Severity Level<\/td>\n<td width=\"24%\">CVE ID<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Insecure transmission of sensitive data<\/td>\n<td width=\"25%\">Information disclosure<\/td>\n<td width=\"25%\">Important<\/td>\n<td width=\"24%\">CVE-2019-8063<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Security policy bypass<\/td>\n<td width=\"25%\">Denial of service<\/td>\n<td width=\"25%\">Important<\/td>\n<td width=\"24%\">CVE-2019-7957<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Insecure privilege inheritance<\/td>\n<td width=\"25%\">Privilege escalation<\/td>\n<td width=\"25%\">Critical<\/td>\n<td width=\"24%\">CVE-2019-7958<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Use of components with a known vulnerability<\/td>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">Critical<\/td>\n<td width=\"24%\">CVE-2019-7959<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<p>Adobe Creative Cloud Desktop Application Version &lt;= 4.6.1<\/p>\n<ul>\n<li>Unaffected versions:<\/li>\n<\/ul>\n<p>Adobe Creative Cloud Desktop Application Version == 4.9<\/p>\n<p>For details about the vulnerability impact and remediation, refer to the security bulletin from the following link:<\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security\/products\/creative-cloud\/apsb19-39.html\">https:\/\/helpx.adobe.com\/security\/products\/creative-cloud\/apsb19-39.html<\/a><\/p>\n<h3><strong>Adobe Prelude CC<\/strong><\/h3>\n<p>Adobe has released security updates for Adobe Prelude CC that address one vulnerability listed in the following table:<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"25%\">Vulnerability Category<\/td>\n<td width=\"25%\">Vulnerability Impact<\/td>\n<td width=\"25%\">Severity Level<\/td>\n<td width=\"24%\">CVE ID<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Insecure library loading (DLL hijacking)<\/td>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">Important<\/td>\n<td width=\"24%\">CVE-2019-7961<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<p>Adobe Prelude CC 2019 Version &lt;= 8.1<\/p>\n<ul>\n<li>Unaffected versions:<\/li>\n<\/ul>\n<p>Adobe Prelude CC 2019 Version == 8.1.1<\/p>\n<p>For details about the vulnerability impact and remediation, refer to the security bulletin from the following link:<\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security\/products\/prelude\/apsb19-35.html\">https:\/\/helpx.adobe.com\/security\/products\/prelude\/apsb19-35.html<\/a><\/p>\n<h3><strong>Adobe Premiere Pro CC<\/strong><\/h3>\n<p>Adobe has released security updates for Adobe Premiere Pro CC that address one vulnerability listed in the following table:<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"25%\">Vulnerability Category<\/td>\n<td width=\"25%\">Vulnerability Impact<\/td>\n<td width=\"25%\">Severity Level<\/td>\n<td width=\"24%\">CVE ID<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Insecure library loading (DLL hijacking)<\/td>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">Important<\/td>\n<td width=\"24%\">CVE-2019-7931<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<p>Adobe Premiere Pro CC 2019 Version &lt;= 13.1.2<\/p>\n<ul>\n<li>Unaffected versions:<\/li>\n<\/ul>\n<p>Adobe Premiere Pro CC 2019 Version == 13.1.3<\/p>\n<p>For details on vulnerability impact and remediation, refer to the security bulletin at the following link:<\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security\/products\/premiere_pro\/apsb19-33.html\">https:\/\/helpx.adobe.com\/security\/products\/premiere_pro\/apsb19-33.html<\/a><\/p>\n<h3><strong>Adobe Character Animator CC<\/strong><\/h3>\n<p>Adobe has released a security update for Adobe Character Animator which addresses one vulnerability listed in the following table:<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"25%\">Vulnerability Category<\/td>\n<td width=\"25%\">Vulnerability Impact<\/td>\n<td width=\"25%\">Severity Level<\/td>\n<td width=\"24%\">CVE ID<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Insecure library loading (DLL hijacking)<\/td>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">Important<\/td>\n<td width=\"24%\">CVE-2019-7870<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<p>Adobe Character Animator CC 2019 Version &lt;= 2.1<\/p>\n<ul>\n<li>Unaffected versions:<\/li>\n<\/ul>\n<p>Adobe Character Animator CC 2019 Version == 2.1.1<\/p>\n<p>For details on vulnerability impact and remediation, refer to the security bulletin at the following link:<\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security\/products\/character_animator\/apsb19-32.html\">https:\/\/helpx.adobe.com\/security\/products\/character_animator\/apsb19-32.html<\/a><\/p>\n<h3><strong>Adobe After Effects CC<\/strong><\/h3>\n<p>Adobe has released security updates for Adobe After Effects CC that address one vulnerability listed in the following table:<\/p>\n<p>Vulnerability details are as follows:<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"25%\">Vulnerability Category<\/td>\n<td width=\"25%\">Vulnerability Impact<\/td>\n<td width=\"25%\">Severity Level<\/td>\n<td width=\"24%\">CVE ID<\/td>\n<\/tr>\n<tr>\n<td width=\"25%\">Insecure library loading (DLL hijacking)<\/td>\n<td width=\"25%\">Arbitrary code execution<\/td>\n<td width=\"25%\">Important<\/td>\n<td width=\"24%\">CVE-2019-8062<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<p>Adobe After Effects CC 2019 Version &lt;= 16<\/p>\n<ul>\n<li>Unaffected versions:<\/li>\n<\/ul>\n<p>Adobe After Effects CC 2019 Version == 16.1.2<\/p>\n<p>For details on vulnerability impact and remediation, refer to the security bulletin at the following link:<\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security\/products\/after_effects\/apsb19-31.html\">https:\/\/helpx.adobe.com\/security\/products\/after_effects\/apsb19-31.html<\/a><\/p>\n<h2><strong>Solution<\/strong><\/h2>\n<p>Adobe has officially released security updates to fix the preceding vulnerabilities. Users are advised to update their installation to the latest versions as soon as possible.<\/p>\n<p>For vulnerability details and remediation, please visit the preceding security bulletin links.<\/p>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n<p>A wholly owned subsidiary of NSFOCUS Information Technology Co. Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview On August 13, 2019, local time, Adobe officially released August&#8217;s security updates to fix multiple vulnerabilities in its various products, including Adobe Photoshop CC\u202f, Adobe Experience Manager, Adobe Acrobat and Reader, Adobe Creative Cloud Desktop\u202fApplication, Adobe Prelude\u202fCC, Adobe Premiere Pro\u202fCC, Adobe Character Animator CC, and Adobe After Effects CC.<\/p>\n","protected":false},"author":1,"featured_media":7712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[57],"class_list":["post-9216","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-adobe-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Adobe Security Bulletins for August 2019 Security Updates Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe Security Bulletins for August 2019 Security Updates Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview On August 13, 2019, local time, Adobe officially released August&#039;s security updates to fix multiple vulnerabilities in its various products,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-26T02:44:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Adobe Security Bulletins for August 2019 Security Updates Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview On August 13, 2019, local time, Adobe officially released August&#039;s security updates to fix multiple vulnerabilities in its various products,\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Adobe Security Bulletins for August 2019 Security Updates Threat Alert\",\"datePublished\":\"2019-08-26T02:44:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/\"},\"wordCount\":1478,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"keywords\":[\"Adobe Security\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/\",\"name\":\"Adobe Security Bulletins for August 2019 Security Updates Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"datePublished\":\"2019-08-26T02:44:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"width\":539,\"height\":187,\"caption\":\"Adobe logo with stylized red \\\"A\\\".\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe Security Bulletins for August 2019 Security Updates Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adobe Security Bulletins for August 2019 Security Updates Threat Alert - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Adobe Security Bulletins for August 2019 Security Updates Threat Alert - NSFOCUS","og_description":"Overview On August 13, 2019, local time, Adobe officially released August's security updates to fix multiple vulnerabilities in its various products,","og_url":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2019-08-26T02:44:32+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Adobe Security Bulletins for August 2019 Security Updates Threat Alert - NSFOCUS","twitter_description":"Overview On August 13, 2019, local time, Adobe officially released August's security updates to fix multiple vulnerabilities in its various products,","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Adobe Security Bulletins for August 2019 Security Updates Threat Alert","datePublished":"2019-08-26T02:44:32+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/"},"wordCount":1478,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","keywords":["Adobe Security"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/","name":"Adobe Security Bulletins for August 2019 Security Updates Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","datePublished":"2019-08-26T02:44:32+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","width":539,"height":187,"caption":"Adobe logo with stylized red \"A\"."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/adobe-security-bulletins-for-august-2019-security-updates-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Adobe Security Bulletins for August 2019 Security Updates Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9216"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9216\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/7712"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}