Adobe Software at Center of Two Vulnerability Disclosures

Newly discovered Photoshop and Ghostscript vulnerabilities allow remote code execution.

Dark Reading logo in a gray background | Dark Reading

In a pair of apparently unrelated notices this week, remote execution vulnerabilities in two products built around Adobe image manipulation products were disclosed - as well as a security update for one of them.

In the first, Adobe announced updates to the Windows and MacOS versions of  Adobe Photoshop CC 2017 and 2018. According to the company, the critical vulnerabilities could allow remote code execution by unauthorized users. In announcing the updates, designated CVE-2018-12810 and CVE-2018-12811, Adobe describes the issues broadly while giving no details about the vulnerabilities or any known "in the wild" exploits.

Each of those two flaws was given a priority ranking of three, meaning that they are remediation for vulnerabilities in products that are not historically prime targets for threat exploits.

The second remote execution flaw announced today is much broader in potential impact: the vulnerability lies in the -dSAFER functionality of Ghostscript, an open source interpreter that allows programs such as GIMP (a popular open source alternative to Adobe Photoshop) to work with Adobe's PostScript and PDF page description languages.

Because Ghostscript is used in both applications and websites to allow display and modification of .PDF and other Adobe format files, even a rapid update to the interpreter would likely take quite a long time to be fully deployed across the Internet.

In a post to loss-security announcing the new vulnerabilities, Tavis Ormandy, the researcher who discovered them, recommended that developers disable "…PS, EPS, PDF and XPS coders in policy.xml by default."

Ormandy, who is on Google's Project Zero team, noted that he has found at least one exploit of the vulnerability in the wild, and that there are similar vulnerabilities that can be exploited with similar tactics. Further, he demonstrated that some of the methods for exploiting the vulnerabilities are trivial, requiring no advanced coding skills or security knowledge.

The new vulnerabilities are not the first to be found in -dSAFER. In a related post, Ormandy noted that he has posted -dSAFER sandbox escapes (methods allowing program execution to escape from the software sandbox designed to limit the effects of malicious code) in the past. 

"This exploit has the potential for file system access leading to sensitive data leak and more as it can be the beachhead opportunity for a more comprehensive data breach," says Stephen Giguere, a sales engineer at Synopsys said.

Related Content:

 

Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for more info

About the Author

Curtis Franklin, Principal Analyst, Omdia

Curtis Franklin Jr. is Principal Analyst at Omdia, focusing on enterprise security management. Previously, he was senior editor of Dark Reading, editor of Light Reading's Security Now, and executive editor, technology, at InformationWeek, where he was also executive producer of InformationWeek's online radio and podcast episodes

Curtis has been writing about technologies and products in computing and networking since the early 1980s. He has been on staff and contributed to technology-industry publications including BYTE, ComputerWorld, CEO, Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, Dark Reading, and ITWorld.com on subjects ranging from mobile enterprise computing to enterprise security and wireless networking.

Curtis is the author of thousands of articles, the co-author of five books, and has been a frequent speaker at computer and networking industry conferences across North America and Europe. His most recent books, Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center, and Securing the Cloud: Security Strategies for the Ubiquitous Data Center, with co-author Brian Chee, are published by Taylor and Francis.

When he's not writing, Curtis is a painter, photographer, cook, and multi-instrumentalist musician. He is active in running, amateur radio (KG4GWA), the MakerFX maker space in Orlando, FL, and is a certified Florida Master Naturalist.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights