Adobe Under Attack

Thursday, September 16, 2010 @ 07:09 AM gHale

Adobe’s Flash product is under attack.
That comes less than a week after it warned users that hackers were exploiting an unpatched bug in its Reader PDF viewer, Adobe officials said.
The company said it would patch Flash in two weeks, and Reader in three weeks.
In a new security advisory on Monday, Adobe said the current version of Flash contains a critical flaw already used in the wild by criminals to attack Windows PCs. “This vulnerability could cause a crash and potentially allow an attacker to take control of the affected system,” the advisory read.
The warning credited Steven Adair of the Shadowserver Foundation for reporting the vulnerability.
All editions of Flash, including those for Windows, Mac, Linux , Solaris and Google ‘s Android mobile operating system, include the flaw.
An Adobe spokeswoman called the attacks as “limited” and “targeted,” and aimed only at Windows users.
The same bug is also present in Adobe Reader and Acrobat, the company’s free PDF viewer, and its commercial PDF creation tool. That’s not unusual, because both Reader and Acrobat include code to run Flash content embedded in PDF documents, making a bug in Adobe’s media player typically require a patch for the PDF programs.
Adobe said it has no reports of attacks exploiting the Flash bug in Reader or Acrobat.
Monday’s warning was the second since Sept. 8, when Adobe issued an advisory about a different unpatched, or “zero-day,” vulnerability in Reader and Acrobat. Experts have said hackers began exploiting the Reader-Acrobat bug about the beginning of the month.
Those attacks have been dubbed “David Leadbetter” after the golf swing coach whose name was included in the subject lines of e-mails that included rigged PDFs. They have been called “scary” and “clever” for the way they sidestep important Windows defenses.
The two bugs in Reader and Acrobat, the one disclosed last week and Monday’s, will be patched in the week of 4 October with an emergency, or “out-of-band” security update.

Leave a Reply

You must be logged in to post a comment.