Adobe stuffs seven critical holes in Flash Player

Adobe has released an important security update for Flash Player . It eliminates seven vulnerabilities, which classifies as critical. An attacker can inject malicious code may and run and take even the complete control of an affected system.

 Adobe (image: Adobe) the error into Flash Player 25.0.0.148 and earlier for Windows and Linux, Flash Player 25.0.0.163 and earlier for Mac OS X, as well as in the Google chrome and Microsoft edge and Internet Explorer 11 integrated Flash-plug-in the. Affected users should upgrade as soon as possible to the fixed version of 25.0.0.171. Adobe considers it very likely that in the short term, appearing, for example, within 72 hours, exploits for the vulnerabilities.

specifically, the update fixes six memory error and a use-after-free bug that could allow remote code execution in each. The vulnerabilities were discovered by security researchers by Tencent KeenLab and Google’s project zero. In contrast to other companies such as Google and Microsoft, Adobe will pay no premiums for the errors found by them external security researchers.

users who have already installed the Flash Player, get the new version automatically using the built-in update function. In addition, Google and Microsoft also automatically distribute the patch to users of their browsers. Alternatively, Flash Player 25.0.0.171 also from the Adobe Download Center can be downloaded.

Moreover, Adobe offers an important security update for experience Manager Forms . A vulnerability in versions 6.2, 6.1 and 6.0 for Windows, Linux, Solaris, and AIX can lead to the disclosure of confidential information. The hotfix 2.0.58 available is for experience Manager forms 6.0. Users of versions 6.1 and 6.2 will receive the updates 6.1 SP2 CFP8 and 6.2 SP1 CFP3.

HIGHLIGHT

more security in the smart home

how your personal IOT before hidden dangers protect – the most important tips

: how well you familiar with browsers? Test your knowledge – take the quiz on silicon.de .

Be the first to comment

Leave a Reply