• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / News / Flash Player After Update: Vulnerability Again

Flash Player After Update: Vulnerability Again

11/08/2017 11:44 by giorgos

Earlier this week, Adobe updated Flash Player, as an error allowed an attacker to use malicious Flash files to steal Windows credentials.

The security issue has the ID CVE-2017-3085 and affects versions of Flash Player from 23.0.0.162 to 26.0.0.137 running on Windows XP, Vista, 7, 8.x and 10.adobe flash patch - Flash Player after update: vulnerability again

Vulnerability was discovered by Dutch security researcher Björn Ruytenberg and is a variant of an earlier defect identifying the CVE-2016-4271, which Adobe updated in September of 2016.

Adobe has updated this issue with the Flash Player 23.0.0.162 version, effectively preventing Flash from making any outbound links to UNCs (Universal Naming Convention, eg:

fillet://///10.0.0.1/some/fillet.txt

But a new bug detected by the same researcher (Ruytenberg) is based on a clever trick that can bypass Adobe's new protection measures.

The researcher explains to one technical suspension on his blog that an attacker could comply with an Adobe ban with UNC addresses and file paths by uploading a Flash file requesting to a remote server via HTTP or HTTPS.

Ruytenberg reports that the attack works only when uploading malicious Flash files to Office (2010, 2013 and 2016), Firefox, or Internet Explorer. Chrome and Edge browsers are not affected by the attack.

Vulnerability was scored (CVSS) 4,3 on 10. However, the flaw is ideal for targeted attacks targeting specific companies or individuals, such as in financial or state government espionage campaigns.

Flash Player After Update: Vulnerability Again was last modified: 12 August, 2017, 11: 14 am by giorgos

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: Newstag: 2010, 2013, fillet, I'm sure, windows

You May Also Like

What does Ctrl + Z do? More than you think
Troubleshoot oobekeyboard and BIOS problems
Patch Tuesday February (56 vulnerabilities - one 0day)

About Us giorgos

George still wonders what he's doing here ...

Previous Post: « iGuRu Outlook beta: Try the new features today
Next Post: SecNews: new theme update (v3.0) iGuRu »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.