Adobe Software at Center of Two Vulnerability DisclosuresNewly discovered Photoshop and Ghostscript vulnerabilities allow remote code execution.
In a pair of apparently unrelated notices this week, remote execution vulnerabilities in two products built around Adobe image manipulation products were disclosed - as well as a security update for one of them.
In the first, Adobe announced updates to the Windows and MacOS versions of Adobe Photoshop CC 2017 and 2018. According to the company, the critical vulnerabilities could allow remote code execution by unauthorized users. In announcing the updates, designated CVE-2018-12810 and CVE-2018-12811, Adobe describes the issues broadly while giving no details about the vulnerabilities or any known "in the wild" exploits.
Each of those two flaws was given a priority ranking of three, meaning that they are remediation for vulnerabilities in products that are not historically prime targets for threat exploits.
The second remote execution flaw announced today is much broader in potential impact: the vulnerability lies in the -dSAFER functionality of Ghostscript, an open source interpreter that allows programs such as GIMP (a popular open source alternative to Adobe Photoshop) to work with Adobe's PostScript and PDF page description languages.
Because Ghostscript is used in both applications and websites to allow display and modification of .PDF and other Adobe format files, even a rapid update to the interpreter would likely take quite a long time to be fully deployed across the Internet.
In a post to loss-security announcing the new vulnerabilities, Tavis Ormandy, the researcher who discovered them, recommended that developers disable "…PS, EPS, PDF and XPS coders in policy.xml by default."
Ormandy, who is on Google's Project Zero team, noted that he has found at least one exploit of the vulnerability in the wild, and that there are similar vulnerabilities that can be exploited with similar tactics. Further, he demonstrated that some of the methods for exploiting the vulnerabilities are trivial, requiring no advanced coding skills or security knowledge.
The new vulnerabilities are not the first to be found in -dSAFER. In a related post, Ormandy noted that he has posted -dSAFER sandbox escapes (methods allowing program execution to escape from the software sandbox designed to limit the effects of malicious code) in the past.
"This exploit has the potential for file system access leading to sensitive data leak and more as it can be the beachhead opportunity for a more comprehensive data breach," says Stephen Giguere, a sales engineer at Synopsys said.
Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for more info.
Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio