Feeds

The long road to Reader and Flash security Nirvana

Critical Adobe updates not easy to come by

Build a business case: developing custom apps

Updated Adobe on Tuesday patched a hole in its ubiquitous Acrobat Reader program that allows attackers to remotely install malware without requiring unsuspecting users to do anything more than browse to the wrong website.

Real-world attacks targeting the vulnerability, which affects all versions of Reader, have been circulating for the past three weeks. The update is for Windows and Mac users only. Those running Reader on Linux will have to wait another one to two weeks before their patches are available. That seems like a long time to wait.

People who don't want Google toolbar foisted upon them are reminded to unclick the "install Google toolbar" checkbox, which can be easy to miss.

To be fair, those attacks are narrowly tailored and require victims to actually open a booby-trapped file. But researcher Didier Stevens has created a proof-of-concept attack that uses the Reader vulnerability to take control of a PC without requiring a user to double-click on anything.

The Reader vulnerability is only the latest security peril to be unleashed on the masses by software from Adobe. Two weeks ago, the company pushed out out a fix for critical vulnerabilities in its Flash player. According to researchers at Secunia, "at least one of them is quite nasty and does indeed allow remote code execution in a very reliable manner."

Like a lot of Reg readers, your reporter is the de facto system administrator for a lot of friends and family members. More than a week after Adobe released the Flash update, none of the 10 PCs in his care had automatically received it. That meant the patch had to be installed manually on each machine.

What's more, computers using more than one browser would appear to need two updates - one for Internet Explorer and another for Firefox. For an update so important, Adobe is certainly making us work awfully hard to install it, no?

Until Adobe makes the process more user-friendly, the best thing to do is to manually check each machine you care about using this link for Flash. We couldn't find a similar link for Reader, so the easiest way to make sure you're current is to open it and choose "check for updates" in the Help menu.

Better yet, use Secunia's Personal Sofware Inspector to stay on top of critical updates for hundreds of third-party applications. We also welcome feedback from Adobe on ways people can lessen the updating pain.

However you update your Adobe software, make sure that you do. The PC you save, may be your own. ®

This article was updated after Adobe released its patch. It was also corrected to reflect that the patch covers Mac versions of Reader, in addition to Windows versions.

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?