Adobe pressed Microsoft in TOP-10 unsafe applications
24.05.11, 09:56, Msk
The Adobe company was the leader among vendors on an indicator of amount of vulnerabilities in her popular free software. Also the companies were included in the "black" list Apple and Microsoft. Holes in security of a number of products of these companies allow to receive full control over a system, the company analyst in the field of cyber security reports.
The spring was a season of vulnerabilities and holes in security, and the Adobe company has nothing to be proud here, according to Top-10 list of software vulnerabilities of the PC from Kaspersky Lab.
Adobe took five places in this list. Vulnerabilities in Adobe Reader/Acrobat also Flash managed to take the three first places on a podium, along with the big holes detected in Adobe Shockwave and still in security Adobe Reader/Acrobat.
From Sun it was Java in the list twice, on the fourth and fifth places, after it there is Apple QuickTime, Winamp and Microsoft Office. Microsoft can feel happier (if it is possible) with such result while it was a source of the majority of vulnerabilities in the list of 2010.
According to Kaspersky Lab, in the first quarter 2011 on computers of users 28,752,203 vulnerable applications and files were revealed.
The applications of Adobe company which took the first three places in this list are characterized by the vulnerabilities mentioned by researchers as "extremely critical". All applications which got in Top-10 after the corresponding actions of the malefactor, allow gaining access to a system and accomplishment of any code with the privileges of the local user.
At the same time in 2010 vulnerability in Adobe Reader was detected on computers of 40.78% of users, in Adobe Flash – 31.32% of users. In 2011 in Adobe Flash – 24.23% of users. And vulnerability in Java developer kit from Sun is detected on the PC of 24.23% of users.
Kaspersky Lab reports that all vulnerabilities which got in Top-10 allow malefactors to get full access to a system in the presence of which other opportunities given by means of these vulnerabilities look not basic.