Flash Player After Update: Vulnerability Again

Earlier this week, Adobe updated it , as a bug allowed an attacker to use malicious Flash files to hijack Windows credentials.

The security issue has the ID CVE-2017-3085 and affects versions of Flash Player from 23.0.0.162 to 26.0.0.137 running on Windows XP, Vista, 7, 8.x and 10.Flash Player

Vulnerability was discovered by Dutch security researcher Björn Ruytenberg and is a variant of an earlier defect identifying the CVE-2016-4271, which Adobe updated in September of 2016.

Adobe has updated this issue with the Flash Player 23.0.0.162 version, effectively preventing Flash from making any outbound links to UNCs (Universal Naming Convention, eg:

file: /////10.0.0.1/some/file.txt

But a new bug detected by the same researcher (Ruytenberg) is based on a clever trick that can bypass Adobe's new protection measures.

The researcher explains to one technical suspension on his blog that an attacker could comply with Adobe's ban on UNC addresses and paths , loading a Flash file that makes a request to a remote server via HTTP or HTTPS.

Ruytenberg says the attack only works when loading malicious Flash files in Office (2010, 2013 and 2016), Firefox or Internet Explorer. The prethe Chrome and Edge are not affected by the attack.

The vulnerability received a Severity Score (CVSS) of 4,3 out of 10. However, the flaw is ideal for targeted targeting specific companies or individuals, such as financial or state government espionage campaigns.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).