Adobe pulls pay-for-patch, issues fix

Powered by SC Magazine
 

Gaffe was a 'PR disaster'.

Adobe has backpedelled and patched a critical buffer overflow vulnerability affecting Photoshop, Flash Professional and Illustrator.

The software giant initially refused to issue emergency patches and instead demanded users shell out some $200 to upgrade products to its latest Creative Suite line which was unaffected.

The vulnerabilities (CVE-2012-0778, CVE-2012-2028 CVE-2012-2026) affected Windows and Mac platforms and allowed attackers to hijack systems if victims executed a malicious TIF file within the Adobe products.

Adobe reasoned that the likelihood that this would happen was low. Photoshop wasn't on the radar of attackers, it said, so concerned users should exercise due diligence.

“Adobe is not aware of any attacks exploiting this vulnerability,” Adobe said in its security bulletin.

Security experts quickly disagreed. Sophos scribe Graham Cluely hit out at Adobe and labelled the affair a “PR disaster for the company”.

”Maybe Adobe customers who feel nervous opening .TIF files will judge the level of risk for themselves, and prefer to seek alternatives from companies that take better care of their users.”

Copyright © SC Magazine, Australia


Adobe pulls pay-for-patch, issues fix
 
 
 
Top Stories
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
Sydney Trains chief thinks beyond Opal
Plots app to help you find a seat on the train.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 437

Vote