Home > Smartphone > Android > Vulnerability exploit found in latest version of Flash 10.2 affecting multiple platforms

Vulnerability exploit found in latest version of Flash 10.2 affecting multiple platforms

Posted by Donny Torrefranca

A ‘zero-day’ exploit has been found within the latest version of Adobe’s Flash 10.2 that is affecting platforms across the board such as Mac, Linux, Android, Windows, etc…

20110412-052859.jpg
With this exploit, a malicious hacker can potentially access and gain control of unsuspecting machines. It can still be prevented however as the malicious code cannot be executed unless actioned upon by the user. These codes are typically embedded as a flash file within a word document attached to an email.

Adobe is currently working on a fix.
According to the notification sent out by Adobe:

We are in the process of finalizing a schedule for delivering updates for Flash Player 10.2.x and earlier versions for Windows, Macintosh, Linux, Solaris and Android, Adobe Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh, Adobe Reader X (10.0.2) for Macintosh, and Adobe Reader 9.4.3 and earlier 9.x versions for Windows and Macintosh. Because Adobe Reader X Protected Mode would prevent an exploit of this kind from executing, we are currently planning to address this issue in Adobe Reader X for Windows with the next quarterly security update for Adobe Reader, currently scheduled for June 14, 2011.

With the latest version released back in March 18th, it’s been nearly a month of vulnerability for some PC and mobile platforms.

Advertise here

About Donny Torrefranca

Former Founder of Mobile blog site MGauge.ca is the Managing Editor for TekTok.ca A smartphone fanatic which started with the iPhone 3G to multiple Blackberry and Android Devices. Willingly sacrificed an arm (and possibly a leg) in order to save his iPad 2.

Check Also

Samsung Takes Huge Swing at Apple with Samsung Galaxy Growing Up Campaign

In a new ad campaign entitled “Growing Up”,  Samsung depicts their version of the Apple …

2 comments

  1. Pingback: Vincent Beneche

  2. Pingback: InfoSec

Leave a Reply