Adobe has patched the same vulnerability for the second time in Acrobat and Reader PDF. Version APSB19-13 , released today, seems to completely eliminate vulnerability CVE-2019-7089, which she tried to deal with company with an update earlier this month.
As it seems, it did not succeed but today's version as claimed by the company came to close the security gap.
In other words, the oldest Adobe update does not fully fix the problem, so all users will need to update the Acrobat and Reader applications again.
According to Symantec's Security Focus, vulnerability is the result of a boundary condition error in Reader and Acrobat, and can be used remotely by intruders.
To exploit the vulnerability exploit the vulnerability το θύμα θα χρειαστεί να ανοίξει στο Acrobat ή στο Reader ένα παγιδευμένο αρχείο, που μπορεί να έρθει είτε με ηλεκτρονικό ταχυδρομείο ή να κατέβει από μια σελίδα. Ανοίγοντας το αρχείο οι πληροφορίες του computer they could end up in the wrong hands.
What's the problem with both patches;
This is a data disclosure defect, which makes it less serious than vulnerabilities that make it easy to run remote code, but Adobe would have to fix it anyway.
Adobe's fix came as part of a large package of updates released on Patch Tuesday in cooperation with Microsoft. The package fixed 150 CVE vulnerabilities in Flash, Acrobat, Reader, Office and Windows.
So Adobe has made the mistake (that is, made it known to everywhere hackers) but did not fix it. Smart?
_________________
- Windows Server and Windows what are the differences
- United Kingdom: Facebook is digital gangsters
- Microsoft released the free Office application for Windows 10
- Windows 10 1903 will give you access to Linux files
- Remove Internet Explorer from Windows 10. You do not need it.
- Windows 10: How do I start Fresh start and why?