Earlier this week, Adobe updated Flash Player as a bug allowed an attacker to maliciously use archives Flash to intercept Windows credentials.
Issue security has as its identifier CVE-2017-3085 and affects versions of Flash Player from 23.0.0.162 to 26.0.0.137 running on Windows XP, Vista, 7, 8.x and 10.
Vulnerability was discovered by Dutch security researcher Björn Ruytenberg and is a variant of an earlier defect identifying the CVE-2016-4271, which Adobe updated in September of 2016.
Adobe has updated this problem με την έκδοση του Flash Player 23.0.0.162, εμποδίζοντας ουσιαστικά το Flash να πραγματοποιήσει οποιεσδήποτε εξερχόμενες συνδέσεις σε διευθύνσεις URL με UNC (Universal Naming Convention, e.g.:
file: /////10.0.0.1/some/file.txt
But a new bug detected by the same researcher (Ruytenberg) is based on a clever trick that can bypass Adobe's new protection measures.
The researcher explains to one technical suspension στο ιστολόγιό του ότι ένας εισβολέας θα μπορούσε να συμμορφωθεί με την απαγόρευση της Adobe με τις διευθύνσεις UNC και τις διαδρομές αρχείων, φορτώνοντας ένα αρχείο Flash που κάνει αίτημα σε έναν απομακρυσμένο διακομιστή μέσω HTTP ή https.
Ruytenberg says the attack only works when loading malicious Flash files in Office (2010, 2013 and 2016), Firefox or Internet Explorer. The programs Chrome and Edge browsers are not affected by the attack.
Vulnerability was scored (CVSS) 4,3 on 10. However, the flaw is ideal for targeted attacks targeting specific companies or individuals, such as in financial or state government espionage campaigns.