• Welcome to BirdForum, the internet's largest birding community with thousands of members from all over the world. The forums are dedicated to wild birds, birding, binoculars and equipment and all that goes with it.

    Please register for an account to take part in the discussions in the forum, post your pictures in the gallery and more.
ZEISS DTI thermal imaging cameras. For more discoveries at night, and during the day.

Adobe Changes Its Tune On Forcing Paid Upgrade To Fix Security Flaws (1 Viewer)

Andrew Rowlands

Well-known member
Wales
Adobe Changes Its Tune On Forcing Paid Upgrade To Fix Security Flaws (updated)

wiredmikey writes with a followup to Thursday's news that Adobe was recommending paid software upgrades in lieu of fixing security holes in some of its applications. After receiving criticism for the security bulletin, Adobe changed its mind and announced that it's developing patches to fix the vulnerabilities. "Developing a patch, especially for three different applications, can be costly and time consuming. Developing these patches consumes development resources, then must run through a QA process, and the patch needs to be communicated and distributed to users. And for a company like Adobe with a massive customer base using its Photoshop, Illustrator, and Flash Professional, the bandwidth cost alone can be substantial. For a popular product that was just over two years old, providing a fix to address a serious security flaw its what customers deserve. And while Adobe may have originally tried to sneak by without addressing the issue and pushing users to upgrade to its new product, the company made the right move in the end."
http://news.slashdot.org/story/12/0...m_campaign=Feed:+Slashdot/slashdot+(Slashdot)

Another source:
The vulnerabilities in Photoshop could be exploited via opening malicious TIFF image files, Adobe said. It did not describe the possible attack methods targeting Illustrator or Flash Professional. According to Adobe, the security issues--which it characterized as "critical vulnerabilities"--could be exploited "to take control of the affected system."
 
Last edited:
Warning! This thread is more than 12 years ago old.
It's likely that no further discussion is required, in which case we recommend starting a new thread. If however you feel your response is required you can still do so.

Users who are viewing this thread

Back
Top