Adobe patches 42 bugs in Reader, Flash
First fixes for flaws in Reader X, new version that includes sandbox
Computerworld - Adobe yesterday patched 29 vulnerabilities in Reader, it's PDF viewer, and 13 more in Flash, the popular Web media browser plug-in, as part of an even larger quarterly security update.
It was the first time that Adobe patched Reader X, the upgrade it issued last November that includes a "sandbox" anti-exploit technology in the Windows version.
Nearly all the Reader bugs were rated "critical," meaning that they could be exploited by attackers to plant malware on an unpatched system, although for several, Adobe wasn't certain that remote code execution was possible. Two of the 29 could lead to cross-site scripting (XSS) attacks, a common tactic by identity thieves who target browsers.
Hackers could exploit one of the vulnerabilities -- a Windows-only flaw -- to gain additional privileges on a machine.
Almost half of the bugs were in Reader's font-, image- or 3-D file-parsing code, Adobe said in the advisory issued on Tuesday.
The updates brought Reader to versions 8.2.6, 9.4.2, an 10.0.1 for Windows and Mac OS X. Linux users must wait until Feb. 28, however, when Adobe will follow with fixes for the Reader edition that works on that operating system.
All but three of the bugs affected Reader X, the upgrade Adobe launched to some fanfare three months ago.
The Windows version of Reader X includes a sandbox, technology that isolates the application from the computer to stop, or at least hinder, attack code from escaping Reader to wreak havoc on the system as a whole.
Reader X's sandbox is based on technologies used by Google and Microsoft. The former sandboxes its Chrome browser, for example, while the latter uses similar defenses to protect Internet Explorer and Office 2010 on Windows.
None of the 26 bugs that impact Reader X are in its sandbox and so cannot be used to bypass its protection, an Adobe spokeswoman confirmed today.
Adobe last updated Reader in mid-November to patch a bug that was had been in play for several weeks prior.
The company also updated Flash Tuesday to patch 13 different vulnerabilities, all labeled critical because they could be exploited to execute attack code. Adobe said eight of the 13 were memory corruption flaws, while others were library loading, integer overflow or font parsing bugs.
Flash reached version 10.2.152.26 with yesterday's security update.
As has been the case for nearly a year, users of Google's Chrome received the new version of Flash in an update to the browser, which Google also issued Tuesday.
Adobe delivered security updates to ColdFusion and Shockwave as well. ColdFusion is Adobe's enterprise-grade Web application server software, and Shockwave remains a popular player for animated Web content.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Malware and Vulnerabilities White Papers | Webcasts