{"id":6727,"date":"2012-04-02T08:13:42","date_gmt":"2012-04-02T14:13:42","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=6727"},"modified":"2016-04-15T14:58:39","modified_gmt":"2016-04-15T20:58:39","slug":"adobe-patches-critical-security-flaws-introduces-auto-updating-mechanism","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/04\/02\/adobe-patches-critical-security-flaws-introduces-auto-updating-mechanism\/","title":{"rendered":"Adobe patches critical security flaws, introduces auto-updating mechanism"},"content":{"rendered":"<p>Last week Adobe released the\u00a0<strong><a href=\"http:\/\/www.adobe.com\/support\/security\/bulletins\/apsb12-07.html\">APSB12-17<\/a><\/strong> Flash Player update.\u00a0The update patches two critical security flaws &#8212; <strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-0772\">CVE-2012-0772<\/a><\/strong> and <strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-0773\">CVE-2012-0773<\/a><\/strong> &#8212;\u00a0in the Adobe Flash player, and also, for the first time ever, introduces <strong><a href=\"http:\/\/blogs.adobe.com\/asset\/2012\/03\/an-update-for-the-flash-player-updater.html\">auto-patching mechanism<\/a><\/strong>. The update affects the following operating systems &#8211;\u00a0Windows, Mac OS X, Linux and Solaris.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/adobe_flash_player_auto_patching.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-6730\" title=\"Adobe_Flash_Player_Auto_Patching\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/adobe_flash_player_auto_patching.png\" alt=\"\" width=\"500\" height=\"207\" \/><\/a><\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p>By default, all users are opted-out of the auto-patching mechanism. Webroot highly recommends that users opt-in, and start taking advantage of the feature in order to ensure that the latest security updates are automatically pushed by Adobe in a timely manner. For the time being, the feature is only available to Windows users.<\/p>\n<p>End and corporate users can download the latest version of the Adobe Flash Player <strong><a href=\"http:\/\/get.adobe.com\/flashplayer\">from this web site<\/a><\/strong>. Users of Google&#8217;s Chrome, which includes the Flash Player plugin by default, can take advantage of the latest Flash Player update, in Chrome&#8217;s latest update,\u00a0<a href=\"http:\/\/googlechromereleases.blogspot.com\/2012\/03\/stable-channel-release-and-beta-channel.html\" rel=\"external\" target=\"_blank\">version 18.0.1025.142<\/a>.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<strong><a href=\"http:\/\/nl.linkedin.com\/in\/danchodanchev\">LinkedIn Profile<\/a><\/strong>. You can also\u00a0<strong><a href=\"http:\/\/www.twitter.com\/danchodanchev\">follow him on \u00a0Twitter<\/a><\/strong>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week Adobe released the\u00a0APSB12-17 Flash Player update.\u00a0The update patches two critical security flaws &#8212; CVE-2012-0772 and CVE-2012-0773 &#8212;\u00a0in the Adobe Flash player, and also, for the first time ever, introduces auto-patching mechanism. The update affects the following operating systems &#8211;\u00a0Windows, Mac OS X, Linux and Solaris. More details:<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3915,4997,4985,7179,10659,5027,6353,10653,4999,7187,10651,10661,6839,4993,4807,10655,3479,10657,4981,3529],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6727"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=6727"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6727\/revisions"}],"predecessor-version":[{"id":19193,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6727\/revisions\/19193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=6727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=6727"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=6727"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=6727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}