Adobe Issues Updates for Flash Zero Day Vulnerability

Monday, April 18, 2011

Headlines

69dafe8b58066478aea48f3d0f384820

Adobe has issued an update to counter the latest Flash player zero-day flaw which is similar to a vulnerability patched last month that was suspected of playing a critical role in the network breach of security vendor RSA, a division of EMC.

Adobe acknowledged last week that the latest Flash vulnerability was being used in email-based attacks utilizing a Microsoft Word document with an embedded Flash file containing malware.

The recent RSA hack had utilized an Excel email attachment with an embedded Flash file that contained malware enabling the attackers to use a version of the Poison Ivy remote administration tool (RAT) to glean authentication credentials and gain access to other systems in the company's network.

From the Adobe advisory:

A critical vulnerability has been identified in Adobe Flash Player 10.2.153.1 and earlier versions (Adobe Flash Player 10.2.154.25 and earlier for Chrome users) for Windows, Macintosh, Linux, and Solaris, and Adobe Flash Player 10.2.156.12 and earlier versions for Android. This vulnerability (CVE-2011-0611), as referenced in Security Advisory APSA11-02, could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via a malicious Web page, or a Flash (.swf) file embedded in a Microsoft Word (.doc) or Microsoft Excel (.xls) file delivered as an email attachment, targeting the Windows platform.

Adobe recommends users of Adobe Flash Player 10.2.153.1 and earlier versions (Adobe Flash Player 10.2.154.25 and earlier versions for Chrome users) for Windows, Macintosh, Linux, and Solaris update to Adobe Flash Player 10.2.159.1 (Adobe Flash Player 10.2.154.27 for Chrome users). Adobe recommends users of Adobe AIR 2.6.19120 and earlier versions for Windows, Macintosh and Linux update to Adobe AIR 2.6.19140. Adobe expects to make available an update for Adobe Flash Player 10.2.156.12 and earlier versions for Android no later than the week of April 25, 2011.

Affected software versions

  • Adobe Flash Player 10.2.153.1 and earlier versions for Windows, Macintosh, Linux, and Solaris operating systems
  • Adobe Flash Player 10.2.154.25 and earlier versions for Chrome users
  • Adobe Flash Player 10.2.156.12 and earlier for Android
  • Adobe AIR 2.6.19120 and earlier versions for Windows, Macintosh and Linux

To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.

To verify the version of Adobe AIR installed on your system, follow the instructions in the Adobe AIR TechNote.

Solution

Adobe recommends all users of Adobe Flash Player 10.2.153.1 and earlier versions for Windows, Macintosh, Linux, and Solaris upgrade to the newest version 10.2.159.1 by downloading it from the Adobe Flash Player Download Center. Windows users can install the update via the auto-update mechanism within the product when prompted.

Google Chrome users can update to Chrome version 10.0.648.205 or later.

Adobe recommends users of Adobe AIR 2.6.19120 and earlier versions for Windows, Macintosh and Linux update to Adobe AIR 2.6.19140.

Adobe expects to make available an update for Adobe Flash Player 10.2.156.12 and earlier versions for Android no later than the week of April 25, 2011.

Source:  http://www.adobe.com/support/security/bulletins/apsb11-07.html

Possibly Related Articles:
12437
Vulnerabilities
Adobe Flash Patching Zero Day Software malware Vulnerabilities Headlines Alert
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.