• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

PSA: Flash Vulnerability found

rasczak

Lifer
http://blogs.zdnet.com/security/?p=1189

Malware hunters have spotted a previously unknown ? and unpatched ? Adobe Flash vulnerability being exploited in the wild.

The zero-day flaw has been added to the Chinese version of the MPack exploit kit and there are signs that the exploits are being injected into third-party sites to redirect targets to malware-laden servers.

Technical details on the vulnerability are not yet available. Adobe?s product security incident response team is investigating.

This SecurityFocus advisory warns:

Adobe Flash Player is prone to an unspecified remote code-execution vulnerability.

An attacker may exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.

Adobe Flash Player 9.0.115.0 and 9.0.124.0 are vulnerable; other versions may also be affected.

I?ve independently verified that redirection scripts have been posted on at least two Chinese-language Web sites to launch drive-by downloads of malware. When the exploit fires, it checks the Flash version on the vulnerable computer and, depending on the result, it uses a different .SWF (shockwave) file to take complete control of the machine.

This threat should be considered very serious because of the widespread distribution that Adobe Flash enjoys on the Windows ecosystem. If this exploit gets seeded on high-traffic Web sites, we could be in for a long clean-up operation.

More from the SANS ISC diary.

[ UPDATE: Continued investigation reveals this issue is fairly widespread. Malicious code is being injected into other third-party domains (approximately 20,000 web pages) most likely through SQL-injection attacks. The code then redirects users to sites hosting malicious Flash files exploiting this issue.]

 
Originally posted by: rasczak
Originally posted by: mechBgon
Ah. disallowed-by-default Software Restriction Policy FTW 😉

Nice Mech! I'm gonna fool around with it at home later on tonight.

Have fun 😀 People sometimes forget Step 3 and then their desktop icons stop working, so keep an eye on that. Anyhow, a great layer of defense against the execution of payloads, portable apps you don't want people running, and malware that travels on portable devices.
 
To add more to this issue, apparently XP SP3 comes with the vulnerable version of flash pre-installed. Way to go Microsoft.
 
Back
Top