Skip to main content

Adobe Flash Player has ‘critical’ security issue, won’t be addressed until next week

If you use Adobe’s Flash Player at all, tread cautiously. The company released a security advisory late yesterday revealing that a “critical vulnerability” was found in pretty much all versions of the multimedia platform as well as in Adobe Acrobat and Adobe Reader.

Affected versions include: “Adobe Flash Player 10.2.152.33 and earlier versions (Adobe Flash Player 10.2.154.18 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris operating systems, Adobe Flash Player 10.1.106.16 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.1) and earlier 10.x and 9.x versions of Reader and Acrobat for Windows and Macintosh operating systems.”

The vulnerability could result in a crash or potentially be exploited by a hacker to “take control of the affected system.” Worse, there are reports already that this security hole is being exploited via a Flash file (.swf) embedded in a Microsoft Excel (.xls) spreadsheet that arrives as an e-mail attachment. So for the two of you who happily download everything that comes into your mailbox, even if you don’t recognize the sender… stop. It appears that there are no similar exploits out there for Reader or Acrobat yet; Adobe notes that the Protected Mode in Reader X “would prevent an exploit of this kind from executing.”

Work on a fix is underway. Those versions of software with critical flaws — which is everything other than Reader X, since running in Protected Mode will keep you safe — are getting the most attention. Adobe expects a fix to go live “during the week of March 21, 2011.” Reader X for Windows will be addressed as well, but not until the applications quarterly security update, which is currently set for release on June 14.

Unfortunately, the question at the start of this post is a rhetorical one. If you’re on the Internet in any way, then you use Flash. Unless you’re using an Apple iDevice, of course. Somewhere in Cupertino, Steve Jobs is snickering.

Topics
Adam Rosenberg
Former Digital Trends Contributor
Previously, Adam worked in the games press as a freelance writer and critic for a range of outlets, including Digital Trends…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more