Adobe Reader/Acrobat: gravi vulnerabilità versioni 9-X-XI

Per parlare di qualsiasi altra cosa che abbia poco o niente a che fare col mondo Mac :D

Moderatore: ModiMaccanici

Avatar utente
mauripucci
Stato: Non connesso
Expert
Expert
Avatar utente
Iscritto il: mer, 29 dic 2010 22:23
Messaggi: 2794
Località: toscana

Top

come da titolo Adobe segnala gravi "falle" in tutte le versioni di Adobe Reader e Acrobat:

Security Advisory for Adobe Reader and Acrobat
prego notare la data: Release date: February 13, 2012- Last updated: February 14, 2012
come è possibile? considerato che alcune delle versioni segnalate (10.1.5) sono state rilasciate ieri?
chiaramente nella fretta del comunicato c'è stato l'errore... confermato dalla data in fondo al documento:
REVISIONS
February 14, 2013: Advisory updated with information on Linux platform.
February 13, 2013: Advisory released.


AFFECTED SOFTWARE VERSIONS
Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh
Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh
Adobe Reader 9.5.3 and earlier 9.x versions for Windows, Macintosh and Linux
Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh
Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh
Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh

il consiglio è... di collegarsi al forum di Adobe... in attesa di ... up to date!

DETAILS
Adobe has identified critical vulnerabilities (CVE-2013-0640, CVE-2013-0641) in Adobe Reader and Acrobat XI (11.0.01 and earlier) for Windows and Macintosh, X (10.1.5 and earlier) for Windows and Macintosh, 9.5.3 and earlier for Windows and Macintosh, and Adobe Reader 9.5.3 for Linux. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system.

Adobe is aware of reports that these vulnerabilities are being exploited in the wild in targeted attacks designed to trick Windows users into clicking on a malicious PDF file delivered in an email message.

Adobe is in the process of working on a fix for these issues and will update this advisory when a date for the fix has been determined.
Users may monitor the latest information on the Adobe Product Security Incident Response Team blog at http://blogs.adobe.com/psirt" onclick="window.open(this.href);return false; or by subscribing to the RSS feed at http://blogs.adobe.com/psirt/atom.xml" onclick="window.open(this.href);return false;.

Adobe actively shares information about this and other vulnerabilities with partners in the security community to enable them to quickly develop detection and quarantine methods to protect users until a patch is available. As always, Adobe recommends that users follow security best practices by keeping their anti-malware software and definitions up to date.

http://www.adobe.com/support/security/a ... 13-02.html" onclick="window.open(this.href);return false;

Avatar utente
mauropasha
Stato: Non connesso
Geniale
Geniale
Avatar utente
Iscritto il: sab, 07 giu 2008 15:51
Messaggi: 13910
Località: Bari

Top

Contatta:
Per fortuna noi abbiamo Anteprima!
:wink:
mauro
se non sai cosa stai per fare, non lo fare
senza dimenticare che sbagliando s'impara

Rispondi

Torna a “Off-Topic | Discussioni generiche”

Chi c’è in linea

Visitano il forum: Nessuno e 9 ospiti