Feeds

You've got three days to patch Adobe Flash, Air, Reader

Seven flaws to fix in Flash, but do the Reader fix first cos' it's under attack already

Secure remote control for conventional and virtual desktops

Adobe has patched seven vulnerabilities in its Flash and Air platforms and one in Reader and Acrobat that is being exploited by attackers.

The vulnerabilities could allow attacker to "take control of affected systems" dubbed critical by the company.

Administrators were urged to apply the updates within three days on Windows, Mac, and Linux platforms.

The updates resolved memory leakage vulnerabilities that could bypass memory address randomisation, a security bypass vulnerability, and a use-after-free flaw leading to code execution.

Adobe issued the lone patch rated critical for Reader and Acrobat platform after it found black hats targeted the flaws in "limited, isolated attacks" against Windows users.

"These updates resolve a sandbox bypass vulnerability that could be exploited to run native code with escalated privileges on Windows," Adobe warned.

The company thanked Kaspersky researchers Costin Raiu and Vitaly Kamluk for reporting the latter vulnerability.

Microsoft also issued nine patches for Internet Explorer; Windows Media Center; One Note; SQL Server, and SharePoint. Redmond warned the browser flaws were under active attack.

The patches followed Microsoft's torpedoing of dodgy outdated Active X and .NET controls. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.