Adobe mimics Microsoft, issues mega patch update
Fixes Reader zero-day flaw to stymie ongoing PDF attacks, trots out 29 patches
Computerworld - Adobe issued a security update today that patched 29 vulnerabilities in its popular PDF viewing and editing applications, most of them bugs that attackers can use to grab control of personal computers.
The update, Adobe's second since it announced that it would patch Adobe Reader and Adobe Acrobat quarterly -- and on the same day that Microsoft delivers its monthly security updates -- fixed one flaw that hackers have already been using in the wild.
"These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system," Adobe acknowledged in the advisory that accompanied the updates to versions 9.2, 8.1.7 and 7.1.4 of both Reader and Acrobat. "Updates apply to all platforms: Windows, Macintosh and UNIX," the advisory added.
Adobe tagged 13 of the 29 bugs with the phrase "could potentially lead to arbitrary code execution," security-speak for vulnerabilities that could be exploited to hijack a system. Like Apple, but unlike Microsoft, Oracle and other large software vendors, Adobe does not apply a rating system to the flaws it fixes.
Four of the bugs may be exploitable, Adobe confirmed, saying that for the quartet, "arbitrary code execution has not been demonstrated, but may be possible." Many of the rest could be used to crash Reader or Acrobat, but were not likely to lead to a compromised computer.
Last week, Adobe confirmed that one of the vulnerabilities patched today was being exploited using rigged PDF files in "limited targeted attacks," and promised then that it would fix the flaw today.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts