Adobe fixes Flash and Photoshop flaws

Powered by SC Magazine
 

Publicly available exploit code leaves millions at risk.

Adobe has released updates that patch security holes in two of the company's most popular products. 

The patches fix three vulnerabilities in the free Flash player plug-in and two in Photoshop. Publicly available exploit code for the flaws has been found on the web.

The two Photoshop vulnerabilities were first disclosed in late April by a security researcher known as 'Marsu'.

The disclosures include code for exploits which could allow an attacker to successfully execute malicious code on a target system via a specially crafted 'bmp', 'dib' or 'rle' document file.

Secunia rated both vulnerabilities as 'highly critical', the firm's second highest threat classification. The flaws affect versions CS2 and CS3 of Photoshop, and one of the flaws also affects Photoshop Elements 5.0. 

The set of three patches for the Flash player browser plug-in were also rated by Secunia as 'highly critical'. The patch affects versions 7, 8 and 9 of the player.

The most severe of the vulnerabilities could allow an attacker to remotely execute code on a target system, while another flaw could allow an attacker to access sensitive user information.

If left unpatched, the Flash player vulnerabilities could put millions of users worldwide at risk.

Adobe estimated earlier this year that 98.7 percent of internet users worldwide had some version of the plug-in.

Both patches are available from Adobe's Security Bulletins and Advisories website.

Copyright ©v3.co.uk


Adobe fixes Flash and Photoshop flaws
 
 
 
Top Stories
IBM, NEC picked for major NSW Transport deals
Final contract negotiations begin.
 
Govt proposes crackdown on ISPs over piracy
Wants new legal powers for copyright industry.
 
Westpac interim CIO resigns
Group CIO yet to be appointed.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  30%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1016

Vote