Adobe patches second Flash zero-day in 9 days

Hackers exploiting bug, company confirms as it also updates Reader, ShockWave and ColdFusion

By , Computerworld |  Security, Adobe, Adobe Flash

For the second time in nine days, Adobe on Tuesday patched a critical vulnerability in Flash Player that hackers were already exploiting.

Adobe also updated its popular Reader PDF viewer to quash 13 new bugs and several older ones the company had not gotten around to fixing.

The memory corruption vulnerability in Flash Player was pegged "critical" by Adobe, which said that the bug could "potentially allow an attacker to take control of the affected system" in an accompanying advisory . "There are reports that this vulnerability is being exploited in the wild in targeted attacks via malicious Web pages," the advisory added.

Adobe last issued an emergency update -- dubbed "out-of-band" -- on June 5, when it fixed a critical flaw that attackers were exploiting to steal Gmail login credentials.

Those attacks were different from the ones Google disclosed the week before, when it accused Chinese hackers of targeting specific individuals , including senior U.S. and South Korean government officials, anti-Chinese government activists and journalists, with messages that tried to trick them into entering their username and password on a fake Gmail login screen.

Google, which bundles Flash Player with Chrome, also updated its browser Tuesday to include the just-patched version of Flash.

Adobe has patched Flash Player four times in the last two months, and six times so far this year.

Although most Flash vulnerabilities can also be exploited using specially crafted PDF documents -- Adobe's Reader includes "authplay.dll," a custom version of Flash that renders content within PDFs -- Adobe said the newest Flash bug doesn't impact Reader.

Alongside the Flash security update, Adobe also fixed 13 new vulnerabilities in Reader. The newest version, Reader X, received at least 17 patches.


Originally published on Computerworld |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question