Adobe moved swiftly to patch the critical zero-day vulnerability in Flash Player with an emergency update five days after it warned users of malicious Word docs exploiting the flaw.
promised, Adobe has patched a zero-day vulnerability in Flash Player that
criminals were already exploiting with malicious Word and Excel documents.
new version with the fixed bug, Flash Player 10.2.159.1, was released for
Windows, Mac OS X, Linux and Solaris on April 15. This update was Adobe's
second emergency patch in less than a month.
acknowledged the latest security flaw in Flash Player on April 11 (security
and promised an emergency update to fix the flaw.
Until the flaw was fixed, users were encouraged to disable Flash entirely.
rolled out the patch a day earlier for its Google Chrome browser through the
Web browser's auto-update
. Adobe and Google have a code-sharing partnership, where the
Chrome team receives updated builds of Flash Player for integration and testing
as soon as they are available. Since Adobe has a longer testing cycle, testing
against more than 60 supported configurations of Windows, Mac OS X, Linux,
Solaris and Android, it usually makes its patch available later than Google, which
only has to test against Chrome, an Adobe spokesperson told eWEEK.
Chrome update also fixed three critical vulnerabilities that could have allowed
attackers to escape Chrome's sandbox and execute on the system.
also issued a patch for Adobe AIR for Windows, Mac OS X and Linux.
users will have to wait until the week of April 25, Adobe said. The patches for
Adobe Reader X for Macs and all Adobe Reader 9 versions and Acrobat X are
expected the same week. The Flash vulnerability exists in Reader and Acrobat
because both programs can execute Flash content embedded in PDF files. Adobe
said Reader X for Windows can trap and stop the exploit from executing because
of its sandbox technology. For this reason, Adobe Reader X for Windows will not
be updated until June.
Reader 9 users can immediately upgrade to Adobe Reader X, downgrade to Reader
8.x as the vulnerability does not exist in that version, or not open any PDF
files at all until the fix is ready.
the initial advisory warned that attackers were using malicious Word documents,
malformed Excel files were later detected exploiting the latest flaw, according
, the independent security researcher, who reported the bug.
Attackers had also used rogue Excel spreadsheets to exploit a different Flash
zero-day vulnerability, which Adobe had patched in March.
Security had been compromised by a phishing email with an attachment that
turned out to be a rogue Excel spreadsheet with malicious Flash code.
malicious attachments masqueraded as files containing information on China's
antitrust laws or a purported Japanese nuclear weapons program. Other detected
samples posed as corporate reorganization plans or company contact lists.
an attack, it is "obfuscated to a large degree and is also technically
interesting in nature," Secunia's
wrote on its blog.
attachments, when executed, downloaded malware onto the victim's computer. The
malware would communicate with a remote server, which Parkour said was
registered in China.