Adobe debuts disk-cleaning tool cleverly disguised as an arbitrary file deletion bug in Creative Cloud on Windows

Patch this flaw, unless you want random docs to wipe out your work


Adobe has issued a patch for a critical flaw that can be exploited to delete files from Windows computers running the Creative Cloud client.

Dubbed CVE-2020-3808, the vulnerability is a classic time-of-check-to-time-of-use flaw where, by exploiting a race condition, a miscreant could potentially trick the system into deleting work-in-progress files and other data-destroying shenanigans.

"Successful exploitation could lead to arbitrary File Deletion in the context of the current user," Adobe said in its bulletin today.

If there is one saving grace here, it's that Adobe told The Register a scumbag would have to convince a mark to download and open a poisoned document to trigger exploitation.

In other words, so long as you don't go around opening random Creative Cloud projects, this shouldn't be a massive problem, but, let's face it, everyone gets sloppy occasionally.

Red alert light

It's 2020 and hackers are still hijacking Windows PCs by exploiting font parser security holes. No patch, either

READ MORE

If you do slip up, a hacker can delete files you've spent a long and hard time working on. The fact Adobe is releasing this now, rather than on a Patch Tuesday, suggests the Silicon Valley biz gets the potential ramifications. Adobe, for its part, described the vulnerability as being a "critical" risk, though only assigned the update a '2' priority rating (a '1' being the highest priority and generally reserved for arbitrary code execution bugs that are under active or imminent attack).

Still, it's never a good idea to put off patching. Users and admins should update Creative Cloud for Windows to version 5.1 or later to make sure their machines are guarded from the flaw.

No other operating systems are believed to be at risk.

While you're at it, it would also be a good idea to make sure machines are mitigated against the under-exploit code execution bug described yesterday by Microsoft. The attack, which has not yet been patched, relies on a font-parsing bug to gain malicious code execution. Microsoft has not yet said when it plans to fix that flaw. The next scheduled round of security fixes is due April 14. ®


Other stories you might like

  • DuckDuckGo tries to explain why its browsers won't block some Microsoft web trackers
    Meanwhile, Tails 5.0 users told to stop what they're doing over Firefox flaw

    DuckDuckGo promises privacy to users of its Android, iOS browsers, and macOS browsers – yet it allows certain data to flow from third-party websites to Microsoft-owned services.

    Security researcher Zach Edwards recently conducted an audit of DuckDuckGo's mobile browsers and found that, contrary to expectations, they do not block Meta's Workplace domain, for example, from sending information to Microsoft's Bing and LinkedIn domains.

    Specifically, DuckDuckGo's software didn't stop Microsoft's trackers on the Workplace page from blabbing information about the user to Bing and LinkedIn for tailored advertising purposes. Other trackers, such as Google's, are blocked.

    Continue reading
  • Despite 'key' partnership with AWS, Meta taps up Microsoft Azure for AI work
    Someone got Zuck'd

    Meta’s AI business unit set up shop in Microsoft Azure this week and announced a strategic partnership it says will advance PyTorch development on the public cloud.

    The deal [PDF] will see Mark Zuckerberg’s umbrella company deploy machine-learning workloads on thousands of Nvidia GPUs running in Azure. While a win for Microsoft, the partnership calls in to question just how strong Meta’s commitment to Amazon Web Services (AWS) really is.

    Back in those long-gone days of December, Meta named AWS as its “key long-term strategic cloud provider." As part of that, Meta promised that if it bought any companies that used AWS, it would continue to support their use of Amazon's cloud, rather than force them off into its own private datacenters. The pact also included a vow to expand Meta’s consumption of Amazon’s cloud-based compute, storage, database, and security services.

    Continue reading
  • Atos pushes out HPC cloud services based on Nimbix tech
    Moore's Law got you down? Throw everything at the problem! Quantum, AI, cloud...

    IT services biz Atos has introduced a suite of cloud-based high-performance computing (HPC) services, based around technology gained from its purchase of cloud provider Nimbix last year.

    The Nimbix Supercomputing Suite is described by Atos as a set of flexible and secure HPC solutions available as a service. It includes access to HPC, AI, and quantum computing resources, according to the services company.

    In addition to the existing Nimbix HPC products, the updated portfolio includes a new federated supercomputing-as-a-service platform and a dedicated bare-metal service based on Atos BullSequana supercomputer hardware.

    Continue reading

Biting the hand that feeds IT © 1998–2022