Get your patch chops on people, because chances are you’re running software from Microsoft, Adobe or Oracle that received critical security updates today. Adobe released a Flash Player
update to fix at least 22 flaws, including one flaw that is being
actively exploited. Microsoft pushed out 11 update bundles to fix more
than two dozen bugs in Windows and associated software, including one
that was publicly disclosed this month. And Oracle has an update for its
Java software that addresses at least 15 flaws, all of which are exploitable remotely without any authentication.
Adobe’s patch
includes a fix for a zero-day bug (CVE-2015-3043) that the company
warns is already being exploited. Users of the Adobe Flash Player for
Windows and Macintosh should update to Adobe Flash Player 17.0.0.169 (the current versions other OSes is listed in the chart below).
If you’re unsure whether your browser has Flash installed or what version it may be running, browse to this link. Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, should automatically update to version 17.0.0.169.
Google has an update
available for Chrome that fixes a slew of flaws, and I assume it
includes this Flash update, although the Flash checker pages only report
that I now have version 17.0.0 installed after applying the Chrome
update and restarting (the Flash update released last month
put that version at 17.0.0.134, so this is not particularly helpful).
To force the installation of an available update, click the triple bar
icon to the right of the address bar, select “About Google” Chrome,
click the apply update button and restart the browser.
The most recent versions of Flash should be available from the Flash home page, but beware potentially unwanted add-ons, like McAfee Security Scan. To avoid this, uncheck the pre-checked box before downloading, or grab your OS-specific Flash download from here. Windows
users who browse the Web with anything other than Internet Explorer may
need to apply this patch twice, once with IE and again using the
alternative browser (Firefox, Opera, e.g.).
Microsoft
has released 11 security bulletins this month, four of which are marked
“critical,” meaning attackers or malware can exploit them to break into
vulnerable systems with no help from users, save for perhaps visiting a
booby-trapped or malicious Web site. The Microsoft patches fix flaws
in Windows, Internet Explorer (IE), Office, and .NET
The critical updates apply to two Windows bugs, IE, and Office. .NET
updates have a history of taking forever to apply and introducing issues
when applied with other patches, so I’d suggest Windows users apply all
other updates, restart and then install the .NET update (if available
for your system).
Credits: Krebs
No comments:
Post a Comment