January 14, 2014
November 19, 2013
Adobe has released security updates for Flash Player and ColdFusion to address four vulnerabilities. The Flash update is available for Windows, Mac, and Linux. According to Adobe, the updates are not related to the recent theft of ColdFusion source code.
October 8, 2013 1 Comment
Adobe’s security team recently discovered sophisticated attacks on their network, involving the illegal access of information for approximately 2.9 million Adobe customers, as well as source code for numerous Adobe products. Adobe believes attacks may be related. They are working diligently, both internally and with partners and law enforcement, to address the incident.
Adobe recommends these steps:
- Reset your Adobe ID and password.
- Protect yourself against phishing.
IS&T recommends using the same vigilance as always for safe computing. If you are taking proactive steps to secure your computer, including applying patches immediately after release, and using virus protection software, there is a good chance of avoiding any issues.
An MIT colleague mentioned to me that the Adobe security alert was also emailed out to Adobe customers. If you did receive one, you might be tempted to ignore it, or assume it is a scam.
As with all emails that might seem fake, be sure to verify that the email came from an Adobe email address and that any links embedded in the message truly link to an adobe.com web page. Other things to look for in “phishy” emails.
September 18, 2013
There have been patches for the operating systems, for Safari for Mac, for Java and Adobe vulnerabilities, quite a long list compared to previous years.
There really are attacks out there against Macs which exploit vulnerabilities, so accepting and installing these patches is important.
February 19, 2013
Adobe has released updates to address multiple vulnerabilities in both Windows and Mac platforms.
- Adobe Flash Player 11.5 and earlier
- Adobe AIR 3.5 and earlier
- Adobe Shockwave Player 11.6 and earlier
Adobe recommends that users of these products apply the updates. A remote unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system.
To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page. Do this for each browser you use. Google Chrome automatically updates when new versions of Flash Player are available.
December 18, 2012
Adobe has released updates for Flash and AIR which include high priority fixes for Flash Player on Windows. The vulnerabilities are being actively exploited in the wild. Three vulnerabilities are addressed including a buffer overflow, an integer overflow and a memory corruption problem, all of which can, Adobe says, lead to code execution. Adobe also released a security hotfix for ColdFusion 10, not currently being exploited in the wild. The fix is available for Windows, Mac OS X and UNIX.
October 1, 2012
In other news, Adobe says it will revoke a code signing certificate after discovering malware that was digitally signed by the certificate. Adobe is currently investigating what appears to be inappropriate use of an Adobe code signing certificate for Windows. A Microsoft spokeswoman stated: “Microsoft will take the appropriate action to help protect its customers,” and said people should contact Adobe for more information. According to Adobe, the vast majority of Adobe software for Windows will not be affected. The revocation of the certificate affects the Windows platform and three Adobe AIR applications that run on both Windows and Macintosh. More information on the impact, and what to do, can be found on the Adobe support page.
August 22, 2011
Here is some more information on the vulnerability in Photoshop. If a user opens a malicious GIF file with Photoshop CS 5.1 or earlier, the application could crash and an attacker could take control of the affected system.
The update for Adobe Photoshop CS 5.1 and earlier is unusual in that you can not install it through the “check for updates” tool in Photoshop, nor is it accessible through the Adobe Application Manager, which is how other updates for the Adobe products are installed.
To obtain the standard multiplugin update for Adobe Photoshop CS 5.1 and earlier, click on the appropriate link below for your system:
Be sure to follow the installation instructions on the downloads page.
There are multiple vulnerabilities found in various Adobe products. This month Adobe released updates to address these vulnerabilities.
- Shockwave Player 11.6 and earlier
- Flash Media Server 4 and earlier
- Adobe Flash Player 10.3 and earlier
- Adobe AIR 2.7 and earlier
- Adobe Photoshop CS5.1 and earlier
- RoboHelp 9 and earlier
Users of these Adobe products should review the relevant security bulletins and follow the recommended solutions, which in most cases involves installing the newest update. An attacker may use these vulnerabilities to run malicious code (malware) or cause a denial of service on an affected system.
Click the links below to access the security bulletins for the affected systems:
April 19, 2011
Flash Player 10.2
A critical vulnerability exists in Flash Player 10.2.153.1 and earlier versions for Windows, Macintosh, Linux and Solaris; Flash Player 10.2.156.12 and earlier for Android; and Adobe Flash Player 10.2.154.25 and earlier for Chrome users.
Adobe recommends users of Flash Player to update to version 10.2.159.1 (or Flash Player 10.2.154.27 for Chrome users), now available. Android users will have to wait until the week of April 25th for the update to version 10.2.156.12. Users of Adobe AIR should update to Adobe AIR 2.6.19140.
Read the security bulletin on Flash Player.
Reader 9 and 10
A critical vulnerability exists in the Authplay.dll component of Adobe Reader for Windows and Macintosh operating systems.
An update will be made available to Reader 9.4.3 and earlier for Windows and Macintosh and Reader X (10.0.1) for Macintosh the week of April 25th. Because Protected Mode would prevent an exploit in Adobe Reader X for Windows, Adobe will address this issue in the next quarterly security update scheduled for June 14, 2011.
A critical vulnerability exists in the Authplay.dll component of Acrobat X (10.0.2) and earlier for Windows and Macintosh operating systems.
An update will be made available to Adobe Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh the week of April 25th.
Read the full bulletin from Adobe on all vulnerabilities.
March 21, 2011
Adobe says it will release emergency fixes for a critical flaw in Flash and Reader that is being actively exploited in targeted attacks to plant malware on vulnerable computers. The patches will be available the week of March 21, according to Adobe, and will address the problem in Adobe Flash player 10 and Adobe Reader versions 9, 10 and X, with the exception of Reader X for Windows. That version of Reader ships with a sandbox feature that has blocked the attack thus far. The attackers are using specially-crafted Microsoft Excel documents to exploit the flaw.