Hackers exploit newest Flash zero-day bug   Leave a comment

Computerworld – Adobe today confirmed that hackers are exploiting a critical unpatched bug in Flash Player, and promised to patch the vulnerability in two weeks.

The company issued a security advisory that also named Adobe Reader and Acrobat as vulnerable.

“There are reports that this vulnerability is being actively exploited in the wild against Adobe Reader and Acrobat,” said Adobe in its warning. The company said it’s seen no sign that hackers are also targeting Flash Player itself.

Those reports came from Mila Parkour, an independent security researcher who notified Adobe early today after spotting and then analyzing a malicious PDF file. According to Parkour, the rigged PDF document exploits the Flash bug in Reader, then drops a Trojan horse and other malware on the victimized machine.

Adobe said that all versions of Flash on Windows, Mac, Linux and Android harbored the bug, and that the “Authplay” component of Reader and Acrobat 9.x and earlier also contained the flaw. Authplay is the interpreter that renders Flash content embedded within PDF files.

Last month, Parkour uncovered a bug in Reader’s font-rendering technology that was exploited by attack campaigns using bogus messages from renowned golf coach David Leadbetter as click bait.

Today’s vulnerability, however, is more reminiscent of one reported in June that also involved Authplay. Adobe issued an emergency patch for Flash Player within a week, and followed with a fix for Reader and Acrobat two weeks later.

Adobe will patch this newest bug in a similar fashion. Today it promised to issue a fix for Flash by Nov. 9, and updates for Reader and Acrobat the following week.

Danish vulnerability tracker Secunia ranked the Flash flaw as “extremely critical,” its highest threat ranking, and said criminals could use it to compromise systems and execute malicious code.

Security experts have regularly criticized Adobe Flash’s security, with some questioning the company’s decision to integrate the media player’s capabilities within the almost-as-popular Reader. Adobe has countered those arguments with its own, saying that many users rely on the functionality.

Until a patch is available, users can protect themselves from active attacks by deleting the “authplay.dll” file that ships with Reader and Acrobat. It gave the same advice in June when the earlier Flash vulnerability was reported.

Dumping authplay.dll, however, will crash Reader and Acrobat or produce an error message when the software opens a PDF file containing Flash content.

Today’s Flash flaw disclosure was the second Adobe’s acknowledged since the technology was ported to Google’s Android operating system two months ago.

Although Adobe tries to hew to a quarterly patch schedule for Reader and Acrobat, it’s repeatedly been forced to scuttle those plans to issue rush fixes for critical bugs. The next regularly-scheduled Reader update was not supposed to land until Feb. 8, 2011.

At times, Adobe has abandoned scheduled Reader updates after shipping an “out-of-band” patch, but that’s unlikely here as the company is in the early days of its next patch cycle.

By Gregg Keizer

http://www.computerworld.com/s/article/9193678/Hackers_exploit_newest_Flash_zero_day_bug?source=CTWNLE_nlt_security_2010-10-29

Advertisements

Posted October 29, 2010 by axxerainc in Uncategorized

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: