Page 8 of 11 FirstFirst ... 4567891011 LastLast
Results 71 to 80 of 107

Thread: Old Adobe updates/advisories

  1. #71
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Post Adobe Reader X released

    FYI...

    Adobe Reader X released
    - http://www.adobe.com/products/reader/tech-specs.html

    - http://www.adobe.com/products/reader/features.html

    - http://get.adobe.com/reader/otherversions/

    - http://www.adobe.com/products/reader.html

    - http://www.adobe.com/support/downloads/new.jsp
    11/18/2010

    - http://isc.sans.edu/diary.html?storyid=9976
    Last Updated: 2010-11-19 17:45:42 UTC - "... This is the version of Reader that has sandbox feature built-in, there is now a degree of separation between the OS and the potentially malicious PDF files. The same sandbox mechanism had been implemented in Google Chrome and also MS Office. Containment of the harmful files lessen the damage should a successful attack were to happen..."

    - http://en.wikipedia.org/wiki/Sandbox...er_security%29

    Last edited by AplusWebMaster; 2010-11-19 at 19:52.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #72
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Adobe Photoshop v12.0.2 released

    FYI...

    Adobe Photoshop v12.0.2 released
    - http://secunia.com/advisories/42492/
    Release Date: 2010-12-13
    Criticality level: Moderately critical
    Impact: Unknown
    Where: From remote
    Solution Status: Vendor Patch
    ... The vulnerabilities are reported in versions prior to CS5 12.0.2.
    Solution: Update to version CS5 12.0.2...
    Original Advisory:
    http://www.adobe.com/support/downloa...jsp?ftpID=4893

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #73
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Adobe Photoshop v12.0.3 security update

    FYI...

    Adobe Photoshop CS5 - Security update
    - http://www.adobe.com/support/securit...apsb10-30.html
    December 17, 2010 - "An important library-loading vulnerability has been identified in Adobe Photoshop CS5 12.0.1 and earlier on the Windows platform. Adobe recommends users update their Adobe Photoshop CS5 installations..."
    CVE number: CVE-2010-3127

    Adobe Photoshop 12.0.3 update
    - http://www.adobe.com/support/downloa...jsp?ftpID=4949
    "... Adobe Photoshop 12.0.3 update fixes a number of high priority bugs including tool tips on Windows XP, painting performance and type-related issues. This update is recommended for all Windows users..."

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  4. #74
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Adobe - multiple updates released ...

    FYI...

    Security updates - Adobe Reader and Acrobat
    - http://www.adobe.com/support/securit...apsb11-03.html
    February 8, 2011
    CVE Numbers: CVE-2010-4091, CVE-2011-0562, CVE-2011-0563, CVE-2011-0564, CVE-2011-0565, CVE-2011-0566, CVE-2011-0567, CVE-2011-0568, CVE-2011-0570, CVE-2011-0585, CVE-2011-0586, CVE-2011-0587, CVE-2011-0588, CVE-2011-0589, CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, CVE-2011-0594, CVE-2011-0595, CVE-2011-0596, CVE-2011-0598, CVE-2011-0599, CVE-2011-0600, CVE-2011-0602, CVE-2011-0603, CVE-2011-0604, CVE-2011-0605, CVE-2011-0606
    "Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations. Adobe recommends users of Adobe Reader X (10.0) and earlier versions for Windows and Macintosh update to Adobe Reader X (10.0.1), available now. Adobe recommends users of Adobe Reader 9.4.1 for UNIX update to Adobe Reader 9.4.2, expected to be available by the week of February 28, 2011. For users of Adobe Reader 9.4.1 and earlier versions for Windows and Macintosh who cannot update to Adobe Reader X (10.0.1), Adobe has made available updates, Adobe Reader 9.4.2 and Adobe Reader 8.2.6. Adobe recommends users of Adobe Acrobat X (10.0) for Windows and Macintosh update to Adobe Acrobat X (10.0.1). Adobe recommends users of Adobe Acrobat 9.4.1 and earlier versions for Windows and Macintosh update to Adobe Acrobat 9.4.2, and users of Adobe Acrobat 8.2.5 and earlier versions for Windows and Macintosh update to Adobe Acrobat 8.2.6...
    Adobe Reader: Users on Windows and Macintosh can utilize the product's update mechanism... Update checks can be manually activated by choosing Help > Check for Updates...
    Adobe Acrobat: Users can utilize the product's update mechanism... Update checks can be manually activated by choosing Help > Check for Updates..."

    - http://secunia.com/advisories/43207/
    Release Date: 2011-02-09
    Criticality level: Highly critical
    Impact: Cross Site Scripting, Privilege escalation, System access
    Where: From remote ...
    Solution: Update to version 8.2.6, 9.4.2, or 10.0.1.
    ___

    • Full Download/Updates-Programs/Add-ons...
    - http://www.adobe.com/support/downloa...atform=Windows
    ___

    ColdFusion - Hotfix available...
    - http://www.adobe.com/support/securit...apsb11-04.html
    February 8, 2011 - "Important vulnerabilities have been identified in ColdFusion 9.0.1 and earlier versions for Windows, Macintosh and UNIX. These vulnerabilities could lead to cross-site scripting, Session Fixation, CRLF injection and information disclosure... Adobe recommends affected ColdFusion customers update their installation using the instructions provided in the technote:
    - http://kb2.adobe.com/cps/890/cpsid_89094.html

    - http://secunia.com/advisories/43264/
    Release Date: 2011-02-09
    Criticality level: Moderately critical
    Impact: Cross Site Scripting, Exposure of sensitive information
    Where: From remote...
    Solution: Apply the Hotfix.
    Original Advisory: Adobe (APSB11-04):
    http://www.adobe.com/support/securit...apsb11-04.html

    Last edited by AplusWebMaster; 2011-02-10 at 13:08.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  5. #75
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Adobe Flash + Shockwave security updates ...

    FYI...

    Adobe Flash Player - Security update
    - http://www.adobe.com/support/securit...apsb11-02.html
    February 8, 2011
    CVE Numbers: CVE-2011-0558, CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0575, CVE-2011-0577, CVE-2011-0578, CVE-2011-0607, CVE-2011-0608
    "Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. Adobe recommends users of Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris update to Adobe Flash Player 10.2.152.26..."

    Direct download current version - executable Flash Player installer...
    - http://fpdownload.adobe.com/get/flas..._player_ax.exe
    For IE ...
    - http://fpdownload.adobe.com/get/flas...ash_player.exe
    For Firefox, other browsers, etc...

    Flash test site: http://www.adobe.com/software/flash/about/
    ... should read: "You have version 10,2,152,26 installed"

    - http://secunia.com/advisories/43267/
    Release Date: 2011-02-09
    Criticality level: Highly critical
    Impact: System access
    Where: From remote
    Solution: Update to version 10.2.152.26.

    - http://www.securitytracker.com/id/1025055
    Feb 9 2011
    ___

    Shockwave Player - Security update
    - http://www.adobe.com/support/securit...apsb11-01.html
    February 8, 2011
    CVE number: CVE-2010-2587, CVE-2010-2588, CVE-2010-2589, CVE-2010-4092, CVE-2010-4093, CVE-2010-4187, CVE-2010-4188, CVE-2010-4189, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, CVE-2010-4193, CVE-2010-4194, CVE-2010-4195, CVE-2010-4196, CVE-2010-4306, CVE-2010-4307, CVE-2011-0555, CVE-2011-0556, CVE-2011-0557, CVE-2011-0569
    "Critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.9.615 and earlier versions on the Windows and Macintosh operating systems. These vulnerabilities could allow an attacker, who successfully exploits these vulnerabilities, to run malicious code on the affected system. Adobe recommends users of Adobe Shockwave Player 11.5.9.615 and earlier versions update to Adobe Shockwave Player 11.5.9.620... Adobe recommends users of Adobe Shockwave Player 11.5.9.615 and earlier versions upgrade to the newest version 11.5.9.620, available here:
    - http://get.adobe.com/shockwave ..."

    - http://www.securitytracker.com/id/1025056
    Feb 9 2011

    Last edited by AplusWebMaster; 2011-02-10 at 13:10.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  6. #76
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Adobe exploits-in-the-wild...

    FYI...

    Flash 0-day targeted attacks...
    - http://isc.sans.edu/diary.html?storyid=10549
    Last Updated: 2011-03-14 20:09:26 UTC - "Adobe posted a security advisory*... These attacks seem to be particularly sneaky – the Flash exploit is embedded in an Excel file which is also used to setup memory so the exploit has a higher chance of succeeding. We will keep an eye on this and if the 0-day starts being used in the wild..."
    ___

    - http://blog.trendmicro.com/excel-fil...exploit-found/
    Mar. 16, 2011
    ___

    * http://www.adobe.com/support/securit...apsa11-01.html
    March 14, 2011 - "Summary: A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions (Adobe Flash Player 10.2.154.13 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris operating systems, Adobe Flash Player 10.1.106.16 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.1) and earlier 10.x and 9.x versions of Reader and Acrobat for Windows and Macintosh operating systems. This vulnerability (CVE-2011-0609) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash (.swf) file embedded in a Microsoft Excel (.xls) file delivered as an email attachment... We are in the process of finalizing a fix for the issue and expect to make available an update for Flash Player 10.x and earlier versions for Windows, Macintosh, Linux, Solaris and Android, and an update for Adobe Acrobat X (10.0.1) and earlier 10.x and 9.x versions for Windows and Macintosh, Adobe Reader X (10.0.1) for Macintosh, and Adobe Reader 9.4.2 and earlier 9.x versions during the week of March 21, 2011..."

    - http://secunia.com/advisories/43751/
    Release Date: 2011-03-15
    Criticality level: Extremely critical
    Impact: System access
    Where: From remote
    Solution Status: Unpatched
    Software: Adobe Flash Player 10.x
    ... The vulnerability is reportedly being actively exploited.
    Solution: Adobe plans to release a fixed version during the week of March 21, 2011...

    - http://secunia.com/advisories/43772
    ___

    - http://www.us-cert.gov/current/#adob..._advisory_for6
    March 15, 2011

    - http://www.kb.cert.org/vuls/id/192052
    Last Updated: 2011-03-15

    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-0609
    Last revised: 03/15/2011
    CVSS v2 Base Score: 9.3 (HIGH)

    - http://www.securitytracker.com/id/1025210
    Mar 15 2011
    - http://www.securitytracker.com/id/1025211
    Mar 15 2011

    Last edited by AplusWebMaster; 2011-03-17 at 18:12.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  7. #77
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Post Android Flash 10.2 update...

    FYI...

    Flash 10.2 update - for Androids only...
    - http://blogs.adobe.com/flashplayer/2...e-devices.html
    March 18, 2011 - "... To see if your device is certified for Flash Player 10.2, visit:
    - http://www.adobe.com/flashplatform/certified_devices/
    ___

    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-0609
    Last revised: 03/15/2011
    CVSS v2 Base Score: 9.3 (HIGH)
    ___

    - http://www.adobe.com/support/securit...apsb11-02.html
    Last updated: March 18, 2011 - "... Adobe recommends users of Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris update to Adobe Flash Player 10.2.152.26..."

    - http://www.adobe.com/support/securit...apsa11-01.html
    Last updated: March 18, 2011 - "... A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier... We are in the process of finalizing a fix for the issue and expect to make available an update for Flash Player 10.x and earlier versions for Windows, Macintosh, Linux, Solaris, and an update for Adobe Acrobat X (10.0.1) and earlier 10.x and 9.x versions for Windows and Macintosh, Adobe Reader X (10.0.1) for Macintosh, and Adobe Reader 9.4.2 and earlier 9.x versions during the week of March 21, 2011..."

    .
    Last edited by AplusWebMaster; 2011-03-21 at 21:02.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  8. #78
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Flash/Reader/Acrobat critical updates released

    FYI...

    - http://www.adobe.com/support/securit...apsa11-01.html
    March 21, 2011 - Updated with information on Security Bulletin APSB11-05 and Security Bulletin APSB11-06

    Flash Player v10.2.153.1 released
    - http://www.adobe.com/support/securit...apsb11-05.html
    March 21, 2011 - "A critical vulnerability has been identified in Adobe Flash Player 10.2.152.33 and earlier... Adobe recommends users of Adobe Flash Player 10.2.152.33 and earlier versions (Adobe Flash Player 10.2.154.18 and earlier versions for Chrome users) for Windows, Macintosh, Linux, and Solaris operating systems update to Adobe Flash Player 10.2.153.1..."

    Direct download current version - executable Flash Player installer...
    - http://fpdownload.adobe.com/get/flas..._player_ax.exe
    For IE ...
    - http://fpdownload.adobe.com/get/flas...ash_player.exe
    For Firefox, other browsers, etc...

    Flash test site: http://www.adobe.com/software/flash/about/
    ... should read: "You have version 10,2,153,1 installed"
    ___

    Adobe Reader, Acrobat updates released
    - http://www.adobe.com/support/securit...apsb11-06.html
    March 21, 2011 - "A critical vulnerability has been identified in the authplay.dll component that ships with Adobe Reader and Acrobat...
    > Adobe recommends users of Adobe Reader X (10.0.1) for Macintosh update to Adobe Reader X (10.0.2). For users of Adobe Reader 9.4.2 for Windows and Macintosh, Adobe has made available the update, Adobe Reader 9.4.3...
    > Adobe recommends users of Adobe Acrobat X (10.0.1) for Windows and Macintosh update to Adobe Acrobat X (10.0.2). Adobe recommends users of Adobe Acrobat 9.4.2 for Windows and Macintosh update to Adobe Acrobat 9.4.3...
    > Users on Windows and Macintosh can utilize the product's update mechanism. The default configuration is set to run automatic update checks on a regular schedule. Update checks can be manually activated by choosing Help > Check for Updates.
    > Adobe Reader 9.x users on Windows can also find the appropriate update here:
    http://www.adobe.com/support/downloa...atform=Windows.
    > Adobe Reader users on Macintosh can also find the appropriate update here:
    http://www.adobe.com/support/downloa...form=Macintosh.
    ... Because Adobe Reader X Protected Mode would prevent an exploit of this kind from executing, we are planning to address this issue in Adobe Reader X for Windows with the next quarterly security update for Adobe Reader, currently scheduled for June 14, 2011..."
    ___

    - http://www.us-cert.gov/current/#adob..._player_update
    March 21, 2011
    - http://www.us-cert.gov/current/#adob...y_updates_for7
    March 22, 2011
    ___

    Adobe AIR ...
    - http://www.securitytracker.com/id/1025238
    CVE Reference: http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-0609
    Date: Mar 22 2011
    "... The vendor has issued a fix (2.6)..."
    - http://get.adobe.com/air/

    Last edited by AplusWebMaster; 2011-03-22 at 21:43.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  9. #79
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Adobe exploits in-the-wild ...

    FYI...

    PDF file loaded w/malware used in attack on Spotify...
    - http://forums.spybot.info/showpost.p...&postcount=109
    "... Blackhole Exploit Kit... One of the vulnerabilities the exploit kit uses is a vulnerability in Adobe Reader/Acrobat. The kit uses a heavily obfuscated PDF file..."
    * http://www.virustotal.com/file-scan/...acf-1301413767
    File name: L9FPB1.pdf
    Submission date: 2011-03-29 15:49:27 (UTC)
    Result: 12/43 (27.9%)
    ___

    Flash exploits in-the-wild - SPAM attachments...
    - http://www.f-secure.com/weblog/archives/00002127.html
    March 23, 2011 - "Attackers have been taking advantage of the situation in Japan to trick their targets into opening malicious files. These cases have used infected Excel attachments with Flash exploits... Another sample we've seen (md5:20ee090487ce1a670c192f9ac18c9d18) is an Excel file containing an embedded Flash object that exploits a known vulnerability (CVE-2011-0609). When the XLS file is opened, it shows an empty Excel spreadsheet and starts exploit code via a Flash object. The Flash object starts by doing a heap-spray... the Flash object constructs and loads a second Flash object in runtime... This second Flash object is the main exploit in this malware and it exploits CVE-2011-0609 to execute the shellcode in the heap... As an aside: the main exploit appears to have been delivered in this fashion in an attempt to evade detection. As it is loaded in memory, no physical file is available for scanning by an antivirus engine. Embedding the Flash object that loads the main exploit in an Excel file may be an attempt to further disguise the attack... users should update their Flash player as Adobe has already released a patch for this particular vulnerability. For more information, please see their security advisory*..."
    (Screenshots available at the URL above.)
    * http://forums.spybot.info/showpost.p...7&postcount=28
    Flash Player v10.2.153.1 released

    - http://www.f-secure.com/weblog/archives/00002127.html
    March 23, 2011

    - http://sunbeltblog.blogspot.com/2011...ess-japan.html

    - http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-0609
    Last revised: 03/15/2011
    CVSS v2 Base Score: 9.3 (HIGH)
    "... as exploited in the wild in March 2011..."

    Last edited by AplusWebMaster; 2011-04-02 at 13:18.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  10. #80
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Flash 0-day exploit in-the-wild ...

    FYI...

    Flash 0-day exploit in-the-wild ...
    - http://krebsonsecurity.com/2011/04/n...ing-exploited/
    April 11, 2011 3:32 pm - "Attackers are exploiting a previously unknown security flaw in Adobe’s ubiquitous Flash Player software to launch targeted attacks, according to several reliable sources... the attacks exploit a vulnerability in fully-patched versions of Flash, and are being leveraged in targeted spear-phishing campaigns launched against select organizations and individuals that work with or for the U.S. government. Sources say the attacks so far have embedded the Flash exploit inside of Microsoft Word files made to look like important government documents... A scan of one tainted file used in this attack that was submitted to Virustotal.com* indicates that just one out of 42 anti-virus products used to scan malware at the service detected this thing as malicious..."
    * http://www.virustotal.com/file-scan/...07f-1302359653
    File name: Disentangling Industrial Policy and Competition Policy.doc
    Submission date: 2011-04-09 14:34:13 (UTC)
    Result: 1/42 (2.4%)
    There is a more up-to-date report...
    - http://www.virustotal.com/file-scan/...07f-1304526431
    File name: Disentangling Industrial Policy and Competition Policy.doc
    Submission date: 2011-05-04 16:27:11 (UTC)
    Result: 29/41 (70.7%)

    Screenshot of malicious e-mail:
    - http://regmedia.co.uk/2011/04/12/malicous_email.jpg
    ___

    Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat
    - http://www.adobe.com/support/securit...apsa11-02.html
    April 11, 2011
    CVE number: http://web.nvd.nist.gov/view/vuln/de...=CVE-2011-0611
    A critical vulnerability exists in Flash Player 10.2.153.1 and earlier versions (Adobe Flash Player 10.2.154.25 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris, Adobe Flash Player 10.2.156.12 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems. This vulnerability (CVE-2011-0611) could cause a crash and potentially allow an attacker to take control of the affected system... We are in the process of finalizing a schedule for delivering updates...
    Affected software versions:
    • Adobe Flash Player 10.2.153.1 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems
    • Adobe Flash Player 10.2.154.25 and earlier for Chrome users
    • Adobe Flash Player 10.2.156.12 and earlier for Android
    • The Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems
    NOTE: Adobe Reader 9.x for UNIX, Adobe Reader for Android, and Adobe Reader and Acrobat 8.x are not affected by this issue...

    - http://secunia.com/advisories/44119/
    Release Date: 2011-04-12
    Criticality level: Extremely critical
    Impact: System access
    Where: From remote
    Solution Status: Unpatched
    ... The vulnerability is currently being actively exploited via Office Word documents (.doc) containing malicious Flash content...
    Original Advisory: Adobe:
    http://blogs.adobe.com/psirt/2011/04...apsa11-02.html

    - http://secunia.com/advisories/44149/
    Release Date: 2011-04-12
    Criticality level: Highly critical
    Impact: System access
    Where: From remote
    Solution Status: Unpatched
    ... The vulnerability is caused due to a vulnerable bundled version of Flash Player (authplay.dll)...

    - http://www.securitytracker.com/id/1025324
    Apr 12 2011
    - http://www.securitytracker.com/id/1025325
    Apr 12 2011

    Last edited by AplusWebMaster; 2011-05-07 at 13:28.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •