Feeds

Adobe to patch Black Hat bugs on Thursday

Once more unto the breach

5 things you didn’t know about cloud backup

Adobe plans to release out-of-sequence updates on Thursday (19 August) designed to patch security holes in its Acrobat and Reader PDF software revealed at the Black Hat conference earlier this month.

Updates for Adobe Reader 9.3.3 for Windows, Macintosh and Unix will accompany Adobe Acrobat 9.3.3 for Windows and Macintosh as well as cross-platform patches for Adobe Reader 8.2.3 and Acrobat 8.2.3 - earlier but still supported versions of the software applications. Thursday will also mark the availability of a cross-platform update for Adobe Flash Player 10.1.53.64.

Vulnerable versions of Acrobat bundle an at-risk version of Flash Player. Secondly an integer overflow error in CoolType.dll library packages creates a critical code injection flaw, as explained in an advisory by Secunia here. Both bugs were discovered by Charlie Miller, of Independent Security Evaluators.

Adobe's next quarterly security update falls on 12 October but the Black Hat bugs were too serious to wait for that, hence the decision to push out an earlier release. More details on the planned update can be found in Adobe's advisory here.

Attacks against Adobe's applications are second only to Microsoft as the favourite target for hacker attackers. Adobe is putting a lot of effort into improving its patching and security process but the results, for now at least, remain unseasoned. The software maker's frequent security updates are a little hard to stomach as a result. ®

Boost IT visibility and business value

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.