To fix vulnerabilities in its Flash player in both Windows and Apple systems, Adobe has published a patch for:
“The first vulnerability, CVE-2013-0633, tricks users into downloading a Microsoft Word document sent via e-mail. As you might expect, the document contains malicious SWF (flash’s file extension) content that can then infect a user’s system. This exploit targets the ActiveX version of Flash Player for Windows, Adobe said.
The second exploit, CVE-2013-0634, targets Firefox and Safari users on Mac OS X by directing users to Websites containing malicious Flash content. This vulnerability is also being used against Windows users in a similar manner to the first exploit. Namely, malicious documents delivered via e-mail.”
The easiest way for W7 users to get the patched version is to visit here:
But make sure to uncheck the box (if you don’t want the scan):
The easy way to check is to go here:
“If you see an animation at the top of the page, that means you have Flash installed in your browser. Underneath the animation, you’ll see a little box dubbed “Version Information” telling you which version of Flash you currently have. Compare that number to the chart right below the version information box to make sure you’re up to date.” – pcworld
For W8 users:
“Windows 8 users need to open Windows Update by pressing the Windows Key + C to open the Charms Bar. Next, click the search icon at the top and type “update.” Next, click “Settings” right below the text entry box and then select “Check for updates” in the main window.
Windows 8 users needing to manually update another browser such as Firefox can also download updates directly from Adobe. Chrome users receive updates automatically in the background.”
IE 9 should update automatically as should Chrome and Mozilla/Pale Moon. The automatic update is set that way as a default. Make sure you haven’t changed that.
According to the source, btw… there’s a monster “Patch Tuesday” coming with 12 security updates for 57 vulnerabilities. Adobe will patch Reader and Acrobat.
Btw, if you aren’t running EMET (MS’s Mitigation Tool, it’s recommended to do so).