FRAMINGHAM 9 FEBRUARY 2011 - Adobe yesterday patched 29 vulnerabilities in Reader, it's PDF viewer, and 13 more in Flash, the popular Web media browser plug-in, as part of an even larger quarterly security update.
It was the first time that Adobe patched Reader X, the upgrade it issued last November that includes a "sandbox" anti-exploit technology in the Windows version.
Nearly all the Reader bugs were rated "critical," meaning that they could be exploited by attackers to plant malware on an unpatched system, although for several, Adobe wasn't certain that remote code execution was possible. Two of the 29 could lead to cross-site scripting (XSS) attacks, a common tactic by identity thieves who target browsers.
Hackers could exploit one of the vulnerabilities -- a Windows-only flaw -- to gain additional privileges on a machine.
Almost half of the bugs were in Reader's font-, image- or 3-D file-parsing code, Adobe said in the advisory issued on Tuesday.
The updates brought Reader to versions 8.2.6, 9.4.2, an 10.0.1 for Windows and Mac OS X. Linux users must wait until Feb. 28, however, when Adobe will follow with fixes for the Reader edition that works on that operating system.
All but three of the bugs affected Reader X, the upgrade Adobe launched to some fanfare three months ago.
The Windows version of Reader X includes a sandbox, technology that isolates the application from the computer to stop, or at least hinder, attack code from escaping Reader to wreak havoc on the system as a whole.
Reader X's sandbox is based on technologies used by Google and Microsoft. The former sandboxes its Chrome browser, for example, while the latter uses similar defenses to protect Internet Explorer and Office 2010 on Windows.
None of the 26 bugs that impact Reader X are in its sandbox and so cannot be used to bypass its protection, an Adobe spokeswoman confirmed today.
Adobe last updated Reader in mid-November to patch a bug that was had been in play for several weeks prior.
The company also updated Flash Tuesday to patch 13 different vulnerabilities, all labeled critical because they could be exploited to execute attack code. Adobe said eight of the 13 were memory corruption flaws, while others were library loading, integer overflow or font parsing bugs.
Flash reached version 10.2.152.26 with yesterday's security update.
As has been the case for nearly a year, users of Google's Chrome received the new version of Flash in an update to the browser, which Google also issued Tuesday.
Sign up for Computerworld eNewsletters.