Fortinet Discovers Adobe InDesign CC Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a Memory Corruption vulnerability in Adobe InDesign CC.
Adobe InDesign CC is a desktop publishing software produced by Adobe Systems. It can be used to create works such as posters, flyers, brochures, magazines, newspapers, presentations, books and e-books. InDesign CC can also publish content suitable for tablet devices in conjunction with Adobe Digital Publishing Suite. Graphic designers and production artists are the principal users, creating and laying out periodical publications, posters, and print media. It also supports export to EPUB and SWF formats to create e-books and digital publications, including digital magazines, and content suitable for consumption on tablet computers. In addition, InDesign CC supports XML, style sheets, and other coding markup, making it suitable for exporting tagged text content for use in other digital and online formats.
A critical memory corruption vulnerability exists in Adobe InDesign CC. It is caused by unsafe parsing of a specially crafted .inx file. Successful exploitation of this vulnerability could lead to arbitrary code execution.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Jan 16, 2018
Users should apply the solution provided by Adobe Systems.
Fortinet reported the vulnerability to Adobe Systems on November 6, 2017.
Adobe Systems confirmed the vulnerability on January 9, 2018.
Adobe Systems patched the vulnerability on April 10, 2018.
This vulnerability was discovered by Honggang Ren of Fortinet's FortiGuard Labs.