Also patched by the software maker are two cross-site scripting flaws each in Adobe Connect (CVE-2023-29305 and CVE-2023-29306) and Adobe Experience Manager (CVE-2023-38214 and CVE-2023-38215) that could lead to arbitrary code execution.
Please remove the application using the Acrobat Cleaner Tool here -docs/acrobatetk/tools/Labs/cleaner.html , reboot the computer once and reinstall the application using the link - and check if that helps.
I am deploying Acrobat 9 via Active Directory. According to the documentation I should be able to create an adminstrative installation and then patch that installation. So far that has not worked and I am not certain at this point if there is a problem with patching or the fact that my installation is a CLP license. My next attempt was to deploy with AD, but I modified the setup.ini file and first listed all of the patches, and when that didn't work I put the complete path to each patch in the setup.ini. Still the patches are not applied to the new installation. Can any explain if and how it is possible to deploy a patched copy of acrobat please.
The DC is the Adobe product names refers to Document Cloud, which is Adobe's Cloud storage offering for PDFs. For Continuous or Closs I'll refer you to Adobe's documentation: -docs/acrobatetk/tools/AdminGuide/whatsnewdc.html
Another week another security vulnerability in adobe products. Probably you have already deployed adobe reader with sccm using a custom installation, if not you can find the article here: Install Adobe Reader DC with SCCM . If you have already the product the normal way is just to update the product. In order to do this you need to download just the patch file .msp format from adobe
I am currently playing with the idea of using the adobe patch mangement to deploy the updates, but using software management policies to disable the auto udpater and enforce our chosen configurations.
I figured it out, since I had handed this task to another user they didn't tell me this was happening since march last year, I guess something changed in the naming convention, I had to go into Configuration manager>administration>site>Software update point>Products and check all the adobe stuff along with some new products. thank you
Reader is free, so patch management is the way to go. For Pro the CC Desktop app should be handling updates. Did you make the CC Desktop package in the adobe admin console? You should have the option there for the app w/ standard user to be allow to update.
I have been using the new jamf managed mac apps section to do this with a lot of success. I just set it up to automatically install and scope it to all machines that have acrobat pro. It even updated faster than the updater in creative cloud.
I would just suggest you make sure you're getting only the updates for the apps via -note/release-notes-acrobat-reader.html for patch management. If you download the full installers, it will work, but it's much larger and takes much longer to install than just the updates.
The San Jose-based company also issued further updates across its range of products, including Adobe Connect and Adobe Experience Manager software, which allowed attackers to gain arbitrary code execution on unpatched devices.
Among the critical vulnerabilities patched include a zero-day flaw disclosed in January in Acrobat Reader which could lead to the theft of hashed password values. A micropatch was published by 0patch this week.
Keeping software up to date and patched is a critical aspect of IT security. However, many users can be lax about ensuring they have the latest security patches installed, which is why most software vendors now push patches to users' machines automatically.
Adobe recently patched two use-after-free vulnerabilities in its Acrobat PDF reader that Talos discovered, both of which could lead to arbitrary code execution. Acrobat is one of the most popular PDF readers currently available, especially in the U.S., and many browsers utilize an Acrobat plugin. This means an attacker could trick a user into opening a specially crafted, malicious file in the browser as a file or tricking them into opening it in the desktop application.
The company patched 86 vulnerabilities across nine different platforms, including Flash Player, Photoshop CC, Connect, Acrobat and Reader, DNG Converter, InDesign CC, Digital Editions, Shockwave Player, and Adobe Experience Manager.
The bugs, a combination of use after free, access of uninitialized pointer, buffer over-read, heap overflow, and out-of-bounds read vulnerabilities, could all lead to remote code execution if left unpatched. The update brings Acrobat and Acrobat Reader 2017 from 2017.011.30066 to 2017.011.30068 and Acrobat XI and Reader XI from 11.0.22 to 11.0.23.
aa06259810