Last week Adobe's PSIRT Team published an advisory on vulnerabilities affecting Adobe Reader and Acrobat. Yesterday they published an update that they plan to release a patch to resolve CVE-2013-0640 and CVE-2013-0641 this week.
[1] https://isc.sans.edu/diary/More+adobe+reader+and+acrobat+%28PDF%29+trouble/15151 (fixed typo in response to carpenter jokes below ;-) ) ----------- Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot edu |
Guy 486 Posts ISC Handler Feb 17th 2013 |
Thread locked Subscribe |
Feb 17th 2013 7 years ago |
Hopefully that means the update will be smooth!
![]() (Carpenter's joke: planed = smooth...) |
patermann 35 Posts |
Quote |
Feb 18th 2013 7 years ago |
This will address the 0day exploit used in targeted attacks reported by FireEye http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html
|
0 1 Posts |
Quote |
Feb 18th 2013 7 years ago |
> the update will be smooth!
![]() And will "knot" result in any "framing" errors. (Carpenter's joke) |
Anonymous |
Quote |
Feb 18th 2013 7 years ago |
That patch will never fly.
|
Anonymous |
Quote |
Feb 18th 2013 7 years ago |
SANS- I think you meant "planned" not "planed"- thus all the carpenter jokes. :)
|
Anonymous |
Quote |
Feb 19th 2013 7 years ago |
Lisa G.,
I think that you "hit the nail on the head". Just "cutting-up" before SANS "deplanes" this item. Just get into the plane, and "take-off", eh? http://www.youtube.com/watch?v=1BFPt001PYU |
Anonymous |
Quote |
Feb 20th 2013 7 years ago |
Melvin- very clever! :)
|
Anonymous |
Quote |
Feb 21st 2013 7 years ago |
Sign Up for Free or Log In to start participating in the conversation!