Feeds

Adobe relieves Reader and Acrobat update blues

Plus fixes for 29 security bugs

Using blade systems to cut costs and sharpen efficiencies

Adobe Systems has introduced a new software updater for its Reader and Acrobat applications, one of several additions released Tuesday to protect users against a growing wave of malware attacks.

The new updater was included in in the latest versions of Reader and Acrobat, which Adobe released to fix almost 30 security vulnerabilities, at least one of which was already being targeted in limited attacks. For the time being, the feature will undergo testing in a closed beta program. Eventually, it will be rolled out to all users.

"The purpose of the new updater, once it is active, is to keep end-users up-to-date in a much more streamlined and automated way," Adobe's Steve Gottwals wrote here in announcing the addition.

The pilot should come as welcome news to anyone who has spent time toiling with the current updater. Under the best of cases, it checks only once every seven days to see if there's a new version of Reader, which is entirely inadequate given the frequency and ferocity of many exploits targeting the app. And even then the system, for reasons that still aren't clear, often fails to alert users when a new release is available.

Also introduced in Tuesday's update are features that give admins and end users more control over the types of code that can be executed by the widely deployed program. The controls allow Reader to block all javascript from running or to allow it to run just once in a single PDF document. Reader can also be configured so certain types of javascript commands are permanently blacklisted even while other types are allowed.

Over the past year, criminals have repeatedly used javascript "heap sprayers" to get around security protections such as address space layout randomization. While disabling javascript has provided some protection against these exploits, the move can also break features on websites and intranets. The increased granularity ought to help Adobe Reader strike a better balance between functionality and security.

The changes were introduced during Adobe's second quarterly update for Reader. The company implemented the regularly scheduled update routine to give admins more time to plan the patching of large fleets of machines. To make life easier, it coincides with Microsoft's Patch Tuesday.

In all, Tuesday's release fixed 29 security vulnerabilities, many of which Adobe rated as critical because they could be used to take control of vulnerable machines. While Reader and Acrobat for Windows was the only version that was under limited attack, Adobe warned many of the remote code execution flaws existed on the programs for Max OS X and Unix.

Updates for all platforms are here. For those who don't like excess software bloat, don't forget to uncheck the option to automatically download McAfee Security Scan. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.