- This vulnerability affects: Adobe Flash Player 184.108.40.206 and earlier, running on all platforms (and Air)
- How an attacker exploits it: By enticing you to run specially crafted Flash content (often delivered as a .SWF file)
- Impact: Varies, but in one case an attacker can leverage this flaw to gain access to sensitive content from other web domains you visit.
- What to do: Download and install the latest version of Adobe Flash Player (version 220.127.116.11 for computers)
Adobe Flash Player displays interactive, animated web content called Flash. Although Flash is optional, 99% of PC users download and install it to view multimedia web content. It runs on many operating systems, including mobile operating systems like Android.
In a security bulletin released this week, Adobe announced a patch that fixes three vulnerabilities in Adobe Flash Player 18.104.22.168 and earlier, running on all platforms.
Adobe characterizes two of the vulnerabilities as “security bypass” flaws, and states that attackers could exploit at least one of them to take control of the affected system. However, it’s the third vulnerability that is most interesting and is getting media attention.
A security researcher, Michele Spagnuolo, posted a blog article describing a complex, multi-layered vulnerability called the Rosetta Flash flaw, which involves both the Flash vulnerability, but also depends on JSONP-based web applications. If you’re interested in the intricate technical details of the attack, I recommend you check out the Spagnuolo’s blog post, or presentation. The scope of the vulnerability is a little easier to understand. If an attacker can trick your users into running specially crafted Flash content, he can potentially take advantage of this flaw to steal your user’s information from certain third party domains that use JSONP-based applications. When first discovered, this included domains like Ebay, Tumblr, and some Google applications However, these big companies have since modified their web applications to prevent this flaw.
In any case, Adobe rates these issues as a “Priority 1” issues for Windows and Mac, and recommends you apply the updates as soon as possible (within 72 hours). However, the vulnerability technically affects other platforms as well, so I recommend you update any Flash capable device as soon as you can.
Adobe has released new versions of Flash Player (22.214.171.124 for computers) to fix these issues. If you allow Adobe Flash in your network, you should download and install the new versions immediately. If you’ve enabled Flash Player’s recent “silent update” option, you will receive this update automatically.
- Download Flash Player for your computer:
NOTE: Chrome and newer versions of IE ship with their own versions of Flash, built-in. If you use them as you web browser, you will also have to update them separately, though both often receive their updates automatically.
For All WatchGuard Users:
If you choose, you can configure the HTTP proxy on your XTM appliance to block Flash (and Shockwave) content. Keep in mind, doing so blocks all Flash content, whether legitimate or malicious.
Finally, our Reputation Enabled Defense (RED) and WebBlocker services can often prevent your users from accidentally visiting malicious (or legitimate but booby-trapped) web sites that contain these sorts of attacks. Nonetheless, we still recommend you install Adobe’s Flash update to completely protect yourself from all of these flaws.
Adobe has released updates to fix these Flash vulnerabilities.
This alert was researched and written by Corey Nachreiner, CISSP (@SecAdept)