Adobe Plugs PC Takeover Hole in Flash Player

 
 
By Ryan Naraine  |  Posted 2006-03-15 Print this article Print
 
 
 
 
 
 
 

The vulnerability, which was discovered and reported by Microsoft, could be exploited to launch code execution attacks.

Adobe Systems Flash Player contains a code execution hole that could put millions of users at risk of PC takeover attacks, the company warned in an advisory. The vulnerability, which was reported to Adobe by Microsoft, affects Flash Player Versions 8.0.22.0 and earlier running on Windows. "A malicious SWF [Shockwave Format] must be loaded in Flash Player by the user for an attacker to exploit these vulnerabilities," Adobe said in its APSB06-03 bulletin.
The company said a successful exploit could allow an attacker to "take control of the affected system."
For advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub. The flaw has been patched in Flash Player version 8.0.24.0, which can be downloaded from the Adobe Download Center. The vendor, based in San Jose, Calif., said the flaw also affects several related products, including Breeze Meeting Add-in, Shockwave Player and Flash Debug Player. Click here to read more about Shockwave code execution flaws. "These vulnerabilities could be accessed through content delivered from a remote location via the users Web browser, e-mail client, or other applications that include or reference the Flash Player," the company warned. Separately, Adobe acknowledged a "moderately critical" flaw in its Graphics Server could put users at risk of data manipulation, information exposure and system access attacks. Ziff Davis Media eSeminars invite: Learn how to proactively shield your organizations against threats at all tiers of the network, Symantec will show you how, live on March 21 at 4 p.m. ET. Sponsored by Symantec. The vulnerability, which was discovered and reported by Secunia, allows an anonymous user to place code onto the server that is then run as the interactive user at the time the user logs on. Depending on the configuration of the server, this could be an administrative user, Adobe said. The company has published hardening steps to prevent exploitation of the vulnerability. Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel