I'm still using 5.1 on my w2k box - is it safe?
Adobe pushed out an update to its Reader and Acrobat packages on Monday to close a pair of critical flaws in the popular packages. Patches to version 8.1.2 of each application resolves vulnerabilities which create a means for miscreants to drop malware onto vulnerable systems. Users of earlier versions of the software (Adobe …
For the first time in quite a while, this update is NOT a complete re-installation of Adobe Reader. It's just a 2.2MB msi installer (for Windows at least) package.
This is a good deal better for sysadmins - I can deploy to 100 computers spread over 6 sites without anyone moaning about the download/install time!
I've not seen one of these things before this week, when I had the fortune to see it in action on an older machine. Some unrelated forum site running PHP tried to push some malware on a machine I used. A handful of executable files in %temp%, but no further damage beyond that.
The machine wasn't mine, but I told its owner what happened and I later got to apply a tool I hacked together that prevents downloaded executables from running. Said tool removes execute permissions from new files in limited user-writeable areas.
Lockdown hack or not, it was amusing to see this thing try to do damage and fail miserably. Sure, an updated Adobe Reader fixed it permanently, but were this a zero-day exploit it'd have fallen flat right on day zero.
Biting the hand that feeds IT © 1998–2021