This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Adobe and Google patch flaws

Share this article:
Microsoft to release 13 bulletins covering 22 vulnerabilities on its August Patch Tuesday
Microsoft to release 13 bulletins covering 22 vulnerabilities on its August Patch Tuesday

Adobe and Google have both issued security updates for their Flash Player and Chrome browser respectively.

Adobe released security bulletin APSB12-05 to address critical security issues in Flash Player 11.1.102.62 and earlier versions for Windows, Macintosh, Linux and Solaris; Flash Player 11.1.115.6 and earlier versions for Android 4.x, and Flash Player 11.1.111.6 and earlier versions for Android 3.x and 2.x.

It claimed that these vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system, but said it was not aware of active attacks using either flaw.

Google released updates for Chrome to fix more than a dozen "high-risk" security holes. According to ZDNet, these vulnerabilities were fixed in the newest Google Chrome 17.0.963.65 (Windows, Mac, Linux and Chrome Frame).

Google's patches come in the week of the CanSecWest conference in Vancouver, where it will offer cash prizes totalling $1m and a Chromebook to those who successfully exploit its browser.

blog from the company's security team detailed the rewards and, according to security writer Lisa Vaas on the Sophos Naked Security blog, the contest is a departure for Google: “The reason Google has split off from Pwn2Own and set up its own, Chrome-specific hacking contest this year is because of new changes in the Pwn2Own rules that would hamper Google's ability to get their hands on full, successful exploits.”

Google's security team said that it withdrew its sponsorship when it discovered that contestants were permitted to enter Pwn2Own without having to reveal full exploits (or even all of the bugs used) to vendors.

It said: “Full exploits have been handed over in previous years, but it's an explicit non-requirement in this year's contest and that's worrisome. We will therefore be running this alternative Chrome-specific reward programme. It is designed to be attractive, not least because it stays aligned with user safety by requiring the full exploit to be submitted to us.”

According to Vaas, Google said each set of exploit bugs has to be reliable and fully functional end-to-end, have no element in common, and be of critical impact, present in the latest versions and genuinely "zero-day".

They cannot have been previously reported or shared with third parties, and have to be submitted to Google for judging before being shared anywhere else. Google is also guaranteeing to send non-Chrome bugs to the appropriate vendor immediately.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

VC cyber security funding tops £850 million

VC cyber security funding tops £850 million

A new study from US-based research firm CBI Insights reveals that corporate cyber security investments have risen five-fold since 2009, with 30 percent growth in the last year alone.

Russian/Chinese cyber-security pact raises concerns

Russian/Chinese cyber-security pact raises concerns

News that Russia and China are set to sign a cyber-security treaty next month have left Western cyber experts unsure whether it is a threat or a promising development.

UK police arrest trio over £1.6 million cyber theft from cash machines

UK police arrest trio over £1.6 million cyber ...

London Police have arrested three suspected members of an Eastern European cyber-crime gang who installed malware on more than 50 bank ATM machines across the UK to steal £1.6 million.