Feeds

Critical Flash vuln under active attack, Adobe warns

Tale of two 0days

Intelligent flash storage arrays

Adobe Systems on Monday warned of a critical vulnerability in the most recent version of its Flash Player that is being actively exploited in the wild.

The vulnerability affects Flash Player 10.1.82.76 for Windows, Macintosh, Linux, Solaris, and Android operating systems, Adobe said in an advisory. “There are reports that this vulnerability is being actively exploited in the wild against Adobe Flash Player on Windows,” the warning said, without elaborating. The latest versions of Adobe's Reader and Acrobat applications are vulnerable to the same flaw, but there's no evidence they are being exploited.

The advisory credited Steven Adair of the Shadowserver Foundation for working with Adobe's security team on the vulnerability. Members of Shadowserver weren't immediately available to respond to questions.

The disclosure means there are at least two unpatched flaws in widely used Adobe applications that are presently under attack by criminals. As reported on Wednesday, a separate flaw in Reader 9.3.4 for Windows is also being exploited in emails that try to trick recipients into clicking on an attached PDF file. Once opened, the booby-trapped document exploits a stack overflow flaw in Reader, causing machines to run malware.

While the vulnerability is in all versions of the PDF viewing software, it is being exploited only on Windows-based installations, Adobe has said.

Adobe said it plans to issue a patch for the Flash vulnerability during the week of September 27. An update fixing the Reader vulnerability is scheduled for the week of October 4. In the meantime, users should use an alternative PDF viewer such as Foxit, or if they must use Reader, use it alongside Microsoft's EMET tool.

Protecting against Flash-based exploits is going to be harder, since Flash is used by Gmail and other web-based email services, YouTube, and many other modern online technologies. The easiest way to guard against the attacks is to use the Firefox browser with the NoScript add on. It automatically blocks all Flash content and allows users to specify a list of trusted websites that are excepted. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.