Adobe pulls pay-for-patch, issues fix

Powered by SC Magazine
 

Gaffe was a 'PR disaster'.

Adobe has backpedelled and patched a critical buffer overflow vulnerability affecting Photoshop, Flash Professional and Illustrator.

The software giant initially refused to issue emergency patches and instead demanded users shell out some $200 to upgrade products to its latest Creative Suite line which was unaffected.

The vulnerabilities (CVE-2012-0778, CVE-2012-2028 CVE-2012-2026) affected Windows and Mac platforms and allowed attackers to hijack systems if victims executed a malicious TIF file within the Adobe products.

Adobe reasoned that the likelihood that this would happen was low. Photoshop wasn't on the radar of attackers, it said, so concerned users should exercise due diligence.

“Adobe is not aware of any attacks exploiting this vulnerability,” Adobe said in its security bulletin.

Security experts quickly disagreed. Sophos scribe Graham Cluely hit out at Adobe and labelled the affair a “PR disaster for the company”.

”Maybe Adobe customers who feel nervous opening .TIF files will judge the level of risk for themselves, and prefer to seek alternatives from companies that take better care of their users.”

Copyright © SC Magazine, Australia


Adobe pulls pay-for-patch, issues fix
 
 
 
Top Stories
Inside the stalemate on Australia's piracy code
Still not registered almost five months on.
 
IT staff outline deep anger in Macquarie Uni survey
‘Morale at lowest point in a decade’.
 
Cost blowout to push NBN past $41bn budget
But government funding cap to remain.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
New Windows 10 users, are you upgrading from...




   |   View results
Windows 8
  46%
 
Windows 7
  44%
 
Windows XP
  5%
 
Another operating system
  3%
 
Windows Vista
  2%
TOTAL VOTES: 714

Vote