Adobe CS3 suite—disables Mac OS X firewall
What was the jackass engineer who wrote that code thinking?! I know when I’ve worked with security-sensitive code (the Mac driver for Mac OS 9 PGP Disk for example), I used extreme care. Aren’t you tired of a steady stream of Adobe security flaws? It’s not that hard Adobe. It starts with thinking of customers as something more than sheep to be fleeced. It requires the auditing of security-sensitive code by an expert. That expert costs money, but it also first takes the sincerity to give a damn, and therein lies the problem.
Adobe characterizes the problem as a “potential security vulnerability”. Baloney. It *is* a security vulnerability. Otherwise, why is it a “critical issue”? Adobe states:
The identified vulnerability, if exploited, would compromise the security of the user’s computer, potentially without the user being aware of it. Issues that could occur range from compromised data security, including access to confidential data, to execution of malicious native code.
How is that a “potential” vulnerability? It’s like saying that failed brakes on your car are a “potential” safety issue while driving. I suppose that’s true—at least up to the point that your car and a cement truck attempt to occupy the same place at the same time