Adobe patched it a second time vulnerability at applications Acrobat and PDF Reader. Version APSB19-13 , released today, seems to completely eliminate vulnerability CVE-2019-7089, which the company tried to tackle with an update earlier this month.
As it seems, it did not succeed but today's version as claimed by the company came to close the security gap.
In other words, the older Adobe update does not completely fix the problem, so all users will need to update the Acrobat and Reader applications again.
According to its Security Focus Symantec, the vulnerability is the result of a boundary condition error in Reader and Acrobat and can be exploited remotely by attackers.
To exploit the vulnerability exploit the vulnerability the victim will need to open in Acrobat or Reader a trapped file, which can come either via email or downloaded from a σελίδα. Ανοίγοντας το αρχείο οι information of the computer could end up in the wrong hands.
What's the problem with both patches;
This is a data disclosure flaw, which makes it less serious than the vulnerabilities that facilitate it implementation remote code, but Adobe had to patch it anyway.
Η επιδιόρθωση της Adobe ήρθε σαν μέρος ενός μεγάλου πακέτου ενημερώσεων που κυκλοφόρησε στο Patch Tuesday σε συνεργασία με την Microsoft. Το πακέτο επιδιόρθωνε 150 ευπάθειες CVE σε Flash, Acrobat, Reader, Office και windows.
So Adobe has made the mistake (that is, made it known to everywhere hackers) but did not fix it. Smart?
_________________
- Windows Server and Windows what are the differences
- United Kingdom: Facebook is digital gangsters
- Microsoft released the free Office application for Windows 10
- Windows 10 1903 will give you access to Linux files
- Remove Internet Explorer from Windows 10. You do not need it.
- Windows 10: How do I start Fresh start and why?