Posted on 01/13/2010 12:04:04 PM PST by Wooly
Usually on a Patch Tuesday, the discussion turns to Microsoft; but amid a very light round of Windows fixes, it's Adobe in the spotlight today. Last month, a serious and potentially easily exploitable vulnerability was found in a JavaScript API call, DocMedia.NewPlayer -- a situation where an intentionally crafted PDF file could invoke the call, deallocate the memory allocated when the media player is generated, and then execute the code in that de-allocated memory, without need for privilege.
Adobe Reader 9.3 was released today, right on schedule, to address this issue. In the meantime, the company is realizing the changing nature of the platform business, and how Reader/Acrobat and Flash are now just as susceptible to potential attacks as any other platform, including Windows. Interestingly, the cross-platform nature of the Acrobat platform means that Mac users were just as susceptible to this exploit as Windows users.
Beyond today's update, Adobe is busy working on non-improvised means for improving its platform users' security long-term. Already last October, it began implementing what it calls the JavaScript Blacklist Framework -- a way for its platforms to maintain actively updated lists of non-trusted sources for executable content. Last month, Adobe advised users to use this Framework to effectively blacklist the API call -- a way of turning off the vulnerable function (which was rarely in use anyway) as an alternative to disabling JavaScript.
It seems like they keep making the same mistakes time after time.
Too late for me. What ever it is used Adobe to attack my desk top computer now I cannot log on to Windows. I hope everyone follows your advice.
Thank goodness Fedora uses Okular for pdf files...
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.