

These flaws could allow privilege escalation on the targeted systems. In addition, 3 security bypass vulnerabilities also received fixes with this update. All these vulnerabilities could allegedly lead to arbitrary code execution by a potential attacker. The vulnerabilities include 2 buffer errors, 2 Untrusted pointer dereference vulnerabilities, 5 out-of-bounds write vulnerabilities, 3 heap overflow bugs, and 23 use after free vulnerabilities. As much as 38 different critical security bugs received patches with this update. While the previous month’s update included bug fixes in Flash Player, the Adobe December Patch Tuesday update bundle remained focused on Adobe Reader and Acrobat. This week, Adobe rolled out the last scheduled monthly updates for its products. Critical Vulnerabilities Addressed In Adobe December Patch Tuesday Update Allegedly, Adobe December Patch Tuesday Update fixed as much as 86 different vulnerabilities, including 38 critical security flaws. All these patches specifically addressed bugs in Adobe Reader and Acrobat.

Adobe has patched a number of security vulnerabilities on the last scheduled monthly update of this year.
