--
Another second-Tuesday-of-the-month, another bunch of Adobe critical security updates.I) Adobe Acrobat and Adobe Reader
Security Updates available for Adobe Reader and Acrobat
Details
Adobe has released security updates for Adobe Reader and Acrobat for Windows and Macintosh. These updates address vulnerabilities that could potentially allow an attacker to take over the affected system. Adobe recommends users update their product installations to the latest versions:
Users of Adobe Reader XI (11.0.09) and earlier versions should update to version 11.0.10.
Users of Adobe Reader X (10.1.12) and earlier versions should update to version 10.1.13.
Users of Adobe Acrobat XI (11.0.09) and earlier versions should update to version 11.0.10.
Users of Adobe Acrobat X (10.1.12) and earlier versions should update to version 10.1.13.
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2014-8454, CVE-2014-8455, CVE-2014-9165).Update Adobe Acrobat HERE:
These updates resolve heap-based buffer overflow vulnerabilities that could lead to code execution (CVE-2014-8457, CVE-2014-8460, CVE-2014-9159).
These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2014-8449).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2014-8445, CVE-2014-8446, CVE-2014-8447, CVE-2014-8456, CVE-2014-8458, CVE-2014-8459, CVE-2014-8461, CVE-2014-9158).
These updates resolve a time-of-check time-of-use (TOCTOU) race condition that could be exploited to allow arbitrary write access to the file system (CVE-2014-9150).
These updates resolve an improper implementation of a Javascript API that could lead to information disclosure (CVE-2014-8448, CVE-2014-8451).
These updates resolve a vulnerability in the handling of XML external entities that could lead to information disclosure (CVE-2014-8452).
These updates resolve vulnerabilities that could be exploited to circumvent the same-origin policy (CVE-2014-8453).
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh
Update Reader HERE:
https://get.adobe.com/reader/
II) Adobe Flash Player
Security updates available for Adobe Flash Player
DetailsDownload Flash Player HERE:
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions:
Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 16.0.0.235.
Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.259.
Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.425.
Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to the current version.
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2014-0587, CVE-2014-9164).
These updates resolve a use-after-free vulnerability that could lead to code execution (CVE-2014-8443).
These updates resolve a stack-based buffer overflow vulnerability that could lead to code execution (CVE-2014-9163).
These updates resolve an information disclosure vulnerability (CVE-2014-9162).
These updates resolve a vulnerability that could be exploited to circumvent the same-origin policy (CVE-2014-0580).
https://get.adobe.com/flashplayer/
III) ColdFusion
Security Update: Hotfixes available for ColdFusion
DetailsUpdate instructions and further details are HERE:
Adobe has released security hotfixes for ColdFusion versions 11 and 10. These hotfixes address a resource consumption issue that could potentially result in a denial of service (CVE-2014-9166).
ColdFusion 10 Update 15
ColdFusion 11 Update 3
--