Adobe zaps critical Shockwave vulnerabilities

Adobe zaps critical Shockwave vulnerabilities

Summary: Adobe joined the Patch Tuesday train today with the release of patches for at least 21 documented security vulnerabilities in the Shockwave and ColdFusion product lines.

SHARE:

Adobe joined the Patch Tuesday train today with the release of patches for at least 21 documented security vulnerabilities in the Shockwave and ColdFusion product lines.

According to the APSB10-12 security bulletin, 18 of the 21 flaws affected the Shockwave Player, a free software product that lets users view rich-media content on the web.

Here's the skinny:follow Ryan Naraine on twitter

Critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.6.606 and earlier versions for Windows and Macintosh. The vulnerabilities could allow an attacker, who successfully exploits these vulnerabilities, to run malicious code on the affected system.

This bulletin is rated "critical" and Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609.

The second bulletin (APSB10-11) is rated "important" and fixes three flaws that could lead to cross-site scripting and information disclosure issues.

These vulnerabilities affect ColdFusion 8.0, 8.0.1, 9.0 and earlier versions for Windows, Macintosh and UNIX.

Adobe said none of the fixes in this update involve zero-day issues or exploits in the wild.

Topics: Enterprise Software, Security

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

8 comments
Log in or register to join the discussion
  • What's that supposed to mean? That they fixed something that wasn't broken?

    0-day basically means not fixed yet.. if there wasn't a vulnerability that hadn't been fixed yet, what did they fix???
    AzuMao
    • RE: Adobe zaps critical Shockwave vulnerabilities

      <a href="http://www.chanelhandbagsreplica.org">chanel replica</a>
      xiaodou
    • RE: Adobe zaps critical Shockwave vulnerabilities

      <a href="http://www.replicacool.org/louis-vuitton-c-3.html">luis vuitton bag</a>
      xiaodou
    • re:

      <a rel="dofollow" href="http://www.cheapuggskit.com/"><strong>cheap uggs</strong></a>
      iwdy23
  • Watch out !

    I have updated to latest version of Shockwave via the link you have provided, and it has silently installed Google toolbar, without any prompt !
    Upon uninstalling, it left junk files in my C drive, let alone the Registry.
    Adobe & Google are shameful criminal !
    frankenstone
    • RE: Adobe zaps critical Shockwave vulnerabilities

      I ran into the same thing. I suggest that users write "nastygrams" to Adobe and maybe even Google for trying to slip that under the door. Shame on both of them.
      docqualizer
  • RE: Adobe zaps critical Shockwave vulnerabilities

    Well done! Thank you very much for professional templates and community edition
    <a href="http://www.yuregininsesi.com">sesli sohbet</a> <a href="http://www.yuregininsesi.com">sesli chat</a>
    efsane
  • ewet

    ewet dedim ama neyse
    http://www.bbgporn.com/
    http://www.hmmtube.com/
    dogru deme
    http://www.erotiktube.org/
    http://www.52tube.com/
    http://www.wctube.com/
    http://www.cameporn.com/
    http://www.escortbayan9.com/
    tamam dedim
    myclub