This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Adobe and Google patch flaws

Share this article:
Microsoft to release 13 bulletins covering 22 vulnerabilities on its August Patch Tuesday
Microsoft to release 13 bulletins covering 22 vulnerabilities on its August Patch Tuesday

Adobe and Google have both issued security updates for their Flash Player and Chrome browser respectively.

Adobe released security bulletin APSB12-05 to address critical security issues in Flash Player 11.1.102.62 and earlier versions for Windows, Macintosh, Linux and Solaris; Flash Player 11.1.115.6 and earlier versions for Android 4.x, and Flash Player 11.1.111.6 and earlier versions for Android 3.x and 2.x.

It claimed that these vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system, but said it was not aware of active attacks using either flaw.

Google released updates for Chrome to fix more than a dozen "high-risk" security holes. According to ZDNet, these vulnerabilities were fixed in the newest Google Chrome 17.0.963.65 (Windows, Mac, Linux and Chrome Frame).

Google's patches come in the week of the CanSecWest conference in Vancouver, where it will offer cash prizes totalling $1m and a Chromebook to those who successfully exploit its browser.

blog from the company's security team detailed the rewards and, according to security writer Lisa Vaas on the Sophos Naked Security blog, the contest is a departure for Google: “The reason Google has split off from Pwn2Own and set up its own, Chrome-specific hacking contest this year is because of new changes in the Pwn2Own rules that would hamper Google's ability to get their hands on full, successful exploits.”

Google's security team said that it withdrew its sponsorship when it discovered that contestants were permitted to enter Pwn2Own without having to reveal full exploits (or even all of the bugs used) to vendors.

It said: “Full exploits have been handed over in previous years, but it's an explicit non-requirement in this year's contest and that's worrisome. We will therefore be running this alternative Chrome-specific reward programme. It is designed to be attractive, not least because it stays aligned with user safety by requiring the full exploit to be submitted to us.”

According to Vaas, Google said each set of exploit bugs has to be reliable and fully functional end-to-end, have no element in common, and be of critical impact, present in the latest versions and genuinely "zero-day".

They cannot have been previously reported or shared with third parties, and have to be submitted to Google for judging before being shared anywhere else. Google is also guaranteeing to send non-Chrome bugs to the appropriate vendor immediately.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

34 European banks hit by Android app security attacks

34 European banks hit by Android app security ...

Banks need to put their heads together to develop common and more secure methodologies says Sarb Sembhi, STORM Guidance, following operation Emmental.

Entrepreneur develops hacked data search engine

Entrepreneur develops hacked data search engine

A Portuguese entrepreneur is said to have developed a specialised search engine that can allow access to leaked or allegedly stolen access credentials.

Insider threat levels from ex-staffers greater than expected

Insider threat levels from ex-staffers greater than expected

A third of of ex-employees have access to company data and 9 percent have used their access privileges, says new research.