Adobe fixes "critical" bugs in Reader, Acrobat and RoboHelp publishing tool

Share this article:

Adobe has released security updates for its popular Reader and Acrobat products for Windows users.

The fixes, released Tuesday, addressed a “critical” vulnerability, CVE-2013-5325, resolving a “regression” that permitted the launch of javascript scheme uniform resource identifiers (URIs) while users viewed a PDF in their web browser, an Adobe security bulletin said.

With the updates, a critical flaw, CVE-2013-5327, in Adobe publishing tool RoboHelp 10 for Windows users was also addressed. A memory corruption bug that could allow a saboteur to execute malicious code was fixed with the patch.

Paul Ducklin, a security researcher who writes for Sophos' Naked Security blog, said that users worried about implementing the patch due to hackers' theft of Adobe source code should still apply the Reader and Acrobat updates as it's doubtful that software modifications would be able to slip by the company unnoticed.

“My own opinion is that this is highly unlikely, not least because modern software engineering tools make it comparatively easy to track the changes to the source code files in a product between builds,” Ducklin wrote. “Also, remember that this patch deals with fixing a regression – 'repatching' a previous patch – rather than with a shepherding in [of] a huge raft of changes throughout the product.”

Share this article:

Sign up to our newsletters

More in News

AOL Mail hack furthers spam campaign using spoofed accounts

AOL confirmed on Monday that it was aware of the issue and working to remediate the situation.

Backdoors in Wi-Fi routers, said to be closed, can be reopened

Backdoors in Wi-Fi routers, said to be closed, ...

Although said to be patched, researcher Eloi Vanderbeken discovered during the Easter holiday that backdoors existing in certain wireless routers can be reactivated.

Apple ships Mac OS X updates, fixes several code execution bugs

Apple ships Mac OS X updates, fixes several ...

Among the addressed vulnerabilities, was a bug affecting WindowServer, which could allow an attacker to execute malicious code outside the sandbox.