Adobe Plugs Four Flash Security Holes
- This vulnerability affects: Adobe Flash Player 11.6.602.171 and earlier, running on all platforms
- How an attacker exploits it: By enticing users to visit a website containing malicious Flash content
- Impact: In the worst case, an attacker can execute code on the user’s computer, potentially gaining control of it
- What to do: Download and install the latest version of Adobe Flash Player (version 11.6.602.180 for PC and Mac)
Adobe Flash Player displays interactive, animated web content called Flash. Although Flash is optional, 99% of PC users download and install it to view multimedia web content. It runs on many operating systems, including mobile operating systems like Android.
In a security bulletin released yesterday, Adobe announced a patch that fixes four critical vulnerabilities in their popular Flash Player. Though the flaws differ technically, they all consist of memory corruption issues, including a buffer overflow flaw, a use after free issue, an integer overflow and so on. The issues share the same general impact. If an attacker can entice one of your users to visit a malicious website, or into handling specially crafted Flash (SWF of FLV) content, he could exploit these flaws to execute code on that user’s computer, with that user’s privileges. If your users have administrator privileges, the attacker could gain full control of their computers.
The good news is, unlike the emergency Flash update two weeks ago, attackers don’t seem to be exploiting these flaws in the wild right now. Nonetheless, Adobe rates the update as a “Priority 1” for Windows users, and recommends you apply the it as soon as possible (within 72 hours). We have noticed that attackers and researchers seem to be finding holes in Flash as often as they are Java. Whatever platform you run it on, we highly recommend you keep Flash up to date.
Adobe has released new versions of Flash Player (11.6.602.180 for PC and Mac) to fix these issues. If you allow Adobe Flash in your network, you should download and install the new versions immediately. If you’ve enabled Flash Player’s recent “silent update” option, you will receive this update automatically.
- Download Flash Player for your computer:
For All WatchGuard Users:
If you choose, you can configure the HTTP proxy on your XTM appliance to block Flash content. Keep in mind, doing so blocks all Flash content, whether legitimate or malicious.
Our proxies offer many ways for you to block files and content, including by file extension, MIME type, or by using very specific hexidecimal patterns found in the body of a message – a technique sometimes referred to as Magic Byte detection. Below I list the various ways you can identify various Flash files:
- .swf – Shockwave
- .flv – Adobe Flash file (file typically used on websites)
- .fla – Flash movie file
- .f4v – Flash video file
- .f4p - Protected Flash video file
- .f4a – Flash audio file
- .f4b – Flash audiobook file
We are realistic : a no deposit casino bonus is usually not just the South African jackpot.
FILExt.com reported Magic Byte Pattern:
- Hex SWF: 46 57 53
- ASCII SWF: FWS
(Keep in mind, not all the Hex and ASCII patterns shared here are appropriate for content blocking. If the pattern is too short, or not unique enough, blocking with them could result in many false positives)
If you decide you want to block Flash files, the links below contain instructions that will help you configure your Firebox proxy’s content blocking features using the file and MIME information listed above.
- XTM Appliance with WSM 11.x
- Firebox X Edge running 10.x
- Firebox X Core and X Peak running Fireware 10.x
Adobe has released updates to fix these Flash vulnerabilities.
Lots of Patches, Celebrity Hacks, and a SSL/TLS Weakness
If you’re anything like the average IT professional, you’re probably too busy putting out proverbial IT helpdesk fires, and installing new business IT solutions to spend much time each week staying on top of the latest security news and threats. That’s where we come in! For a quick recap of the biggest information and network security news from the week, check out the YouTube video below.
In this episode, I cover a ton of software updates from the week (it was Patch Day after all), the latest celebrity hack incident, an ironic breach of a security organization’s web site, and yet another weakness in the SSL/TLS encryption protocol. I even share a tip on how webmasters can learn to recover from web site hacks.
Enjoy the episode, and share your thoughts, suggestions, and questions in the comment section below. You can also find more details about these stories in the Reference section. Thanks for watching, and enjoy your St. Patty’s Day weekend.
(Episode Runtime: 11:00)
Direct YouTube Link: http://www.youtube.com/watch?v=yD6wNDXVsHE
- Microsoft Patch Day March 2013 - WGSC
- Adobe Flash Update March 2013 - WGSC
- Apple Updates We are committed to comply with a directive for the responsible conduct of click here gambling.
OS X and Safari – Apple
- Attacker leaks PII for many celebrities – Hollywood Reporter
- Facebook hacker finds another OAuth vulnerability – Nir Goldshlanger blog
- NIST NVD web site breached due to Cold Fusion issue - InfoSecurity
- New weakness found in SSL/TLS RC4 implementation [Slides PDF] - Forbes
- Pro-Tip: Google teaches webmasters how to recover from hacks - Google