Jump to content

Google Project Zero hacker Mateusz Jurczyk outlined a total of 15 critical vulnerabilities


ShyWriter

Recommended Posts

.

By Charlie Osborne for Zero Day |

June 24, 2015 -- 16:03 GMT (09:03 PDT)

 

macsymantec.jpg

Symantec

 

A security researcher has casually revealed 15 vulnerabilities which impact on Microsoft Windows and Adobe Reader.

 

On Tuesday, Google Project Zero hacker Mateusz Jurczyk outlined a total of 15 critical vulnerabilities discovered within font management systems.

 

The research, also presented at the REcon security conference in Montreal in a talk called "One font vulnerability to rule them all: A story of cross-software ownage, shared codebases and advanced exploitation," (.PDF), reveals a set of nasty remote code execution and privilege escalation flaws which can be exploited through Adobe Reader or the Windows Kernel.

 

Jurczyk discovered a number of low to critical-severity security flaws, but the worst two, CVE-2015-3052 and CVE-2015-0093, which exist in both 32-bit and 64-bit systems, are found within the Adobe Type Manager Font Driver. (more...)

 

Read the rest at: http://www.zdnet.com/article/security-researcher-casually-drops-adobe-reader-windows-critical-vulnerability-bomb

 

Steve

Link to post
Share on other sites

Thanks everyone for the warm welcome.. I'm not sure how often, or how much, I can participate but my days of 8-12 hours a day on the forums is long gone. I'll try to visit when I can and I hope when I do visit I can offer something of value.

 

Thanks people/friends,

Steve

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.