Adobe Monthly Security Update (Feb 2020)
Last Update Date:
12 Feb 2020 10:31
Release Date:
12 Feb 2020
5405
Views
RISK: Medium Risk
TYPE: Clients - Productivity Products
Adobe has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes | Details (including CVE) |
Adobe Framemaker | Medium Risk | Remote Code Execution | APSB20-04 | |
Adobe Acrobat and Reader | Medium Risk | Remote Code Execution Information Disclosure | APSB20-05 | |
Adobe Flash Player | Medium Risk | Remote Code Execution | APSB20-06 | |
Adobe Digital Edition | Medium Risk | Remote Code Execution Information Disclosure | APSB20-07 | |
Adobe Experience Manager | Medium Risk | Denial of Service | APSB20-08 |
Number of 'Extremely High Risk' product(s): 0
Number of 'High Risk' product(s): 0
Number of 'Medium Risk' product(s): 5
Evaluation of overall 'Risk Level': Medium Risk
Impact
- Denial of Service
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- Adobe Framemaker 2019.0.4 and earlier versions
- Adobe Acrobat DC 2019.021.20061 and earlier versions
- Adobe Acrobat Reader DC 2019.021.20061 and earlier versions
- Adobe Acrobat 2017 2017.011.30156 and earlier versions
- Adobe Acrobat Reader 2017 2017.011.30156 and earlier versions
- Adobe Acrobat 2015 2015.006.30508 and earlier versions
- Adobe Acrobat Reader 2015 2015.006.30508 and earlier versions
- Adobe Flash Player Desktop Runtime (Windows and macOS) 32.0.0.321 and earlier versions
- Adobe Flash Player Desktop Runtime (Linux) 32.0.0.314 and earlier versions
- Adobe Flash Player for Google Chrome 32.0.0.321 and earlier versions
- Adobe Flash Player for Microsoft Edge and Internet Explorer 11 32.0.0.255 and earlier versions
- Adobe Digital Editions 4.5.10 and earlier versions
- Adobe Experience Manager 6.4-6.5
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor. Please refer to 'Details' column in the above table for details of individual product update or run software update
Vulnerability Identifier
Source
Related Link
Share with