There is a newly discovered Flash/Adobe Reader vulnerability with a day zero exploit requiring no user interaction. All you need to do is visit a webpage with Flash on it (and I note that most ads are in Flash) with the exploit. There is no patch at this time.
Aspects of this vulnerability affect all Intel platforms with Flash, Adobe Reader, Acrobat, or other Flash-enabled software packages, including OSX and Linux. The currently-existing exploit has a payload; it is not just proof-of-concept.
eta: By "Intel platforms," I mean, "Intel instruction set platforms." That includes AMD, and is not a fault of the chipset. The exploit runs Intel/AMD instruction set code, so will of course be meaningless on PPC, Alpha, and so on.
Aspects of this vulnerability affect all Intel platforms with Flash, Adobe Reader, Acrobat, or other Flash-enabled software packages, including OSX and Linux. The currently-existing exploit has a payload; it is not just proof-of-concept.
eta: By "Intel platforms," I mean, "Intel instruction set platforms." That includes AMD, and is not a fault of the chipset. The exploit runs Intel/AMD instruction set code, so will of course be meaningless on PPC, Alpha, and so on.