Skip to main content

Adobe

Not to be outdone by Microsoft, Adobe announces zero-day exploit patch for Flash

posted onApril 29, 2014
by l33tdawg

Adobe Systems released emergency security updates for Flash Player in order to fix a vulnerability that has been exploited in attacks against users since earlier this month.

The attacks were discovered by security researchers from Kaspersky Lab and were launched from a website set up by the Syrian Ministry of Justice to receive complaints about law violations. It’s not clear who was behind the attack, but the site had been compromised in the past by hackers.

Adobe releases fix for Flash zero-day

posted onFebruary 6, 2014
by l33tdawg

Adobe has released a fix for a zero-day vulnerability in Flash Player, which impacts users running Windows, Mac and Linux operating systems.

The company yesterday urged Windows and Mac users to download Flash Player versions 12.0.0.44 and 11.7.700.261 (for those who cannot update to version 12.0). Those running Flash on Linux systems were directed to install version 11.2.202.336 of the plug-in.

Adobe issues emergency Flash update for Windows and Mac

posted onFebruary 5, 2014
by l33tdawg

Adobe is recommending that users update their Flash Players immediately -- especially those who frequent Google Chrome and Internet Explorer. The company released an emergency security bulletin on Tuesday that addresses vulnerabilities in Flash, which could be exploited by hackers.

"This vulnerability could allow an attacker to remotely take control of the affected system," Adobe wrote in a blog post. "Adobe is aware of reports that an exploit for this vulnerability exists in the wild, and recommends users apply the updates referenced in the security bulletin."

Windows XP zero day gives attackers a way around Adobe Sandbox

posted onNovember 28, 2013
by l33tdawg

A new zero day flaw in Windows XP and Server 2003 is being exploited in the wild to bypass the sandbox on unpatched versions of Adobe Reader, security firm FireEye has reported.

According to the firm’s analysis, the vulnerability allows for a standard user running XP SP3 to elevate privileges to admin level, allowing a targeted attack on users running Reader versions 9.5.4, 10.1.6, 11.0.02 and before using a malicious PDF.

Flash Player now sandboxed under Safari on Mac OS X

posted onOctober 23, 2013
by l33tdawg

Adobe has worked with Apple to sandbox Flash Player under Safari in Mac OS X, restricting the ability of attackers to exploit any vulnerabilities they might find in the browser plug-in.

"With this week's release of Safari in OS X Mavericks, Flash Player will now be protected by an OS X App Sandbox," Peleus Uhley, platform security strategist at Adobe, said Wednesday in a blog post. A sandbox is a mechanism that enforces certain restrictions on how an application interacts with the underlying operating system.

Mass Customized Attacks Show Malware Maturity

posted onMay 20, 2013
by l33tdawg

L33tdawg: Video of their talk from #HITB2013AMS is available on YouTube.

Products frequently follow a trajectory from customized prototypes to mass-produced goods, and -- when the market matures -- manufacturers typically find ways to lure consumers by allowing efficient customization.