Confusion mounts over which Flash versions are under attack
Chinese hackers exploit stand-alone versions, but not current plug-in, says Symantec
Computerworld - Contrary to initial reports, the Flash Player exploit being fed to users who visit legitimate Web sites is not a true zero-day exploit, a researcher said today.
But that's hardly the point, said Don Jackson, the director of threat intelligence at SecureWorks Inc. "I'd still call this catastrophic," said Jackson, "because when you look at the distribution of Flash versions, users hardly ever have the latest one."
In fact, Jackson was on target in more ways than he knew. Ben Greenbaum, a senior research manager at Symantec Corp., said later that although the vulnerability is not new -- and thus not really a "zero-day" bug -- some up-to-date versions of Flash Player are vulnerable to attack.
Greenbaum called it a "false-positive zero-day" and added that the exploit in circulation "does still work against some of the most current and patched versions of Flash Player, and so still has some characteristics of a zero-day."
For his part, Jackson said that the currently available version of Flash Player, dubbed 184.108.40.206, is immune, while computers running Flash Player 220.127.116.11 -- the edition superseded by an April update that Adobe Systems Inc. released to patch other vulnerabilities -- is susceptible to attack. "It looks like [18.104.22.168] has been patched," he said.
Greenbaum, however, went a step further. "The vulnerability is similar enough [to one already disclosed] that we're treating it as the same," he said. "But not all the versions are patched correctly."
The more widely-used browser plug-in of Flash Player 22.214.171.124 is not at risk, said Greenbaum, but the stand-alone Flash Player 126.96.36.199 is. Adobe offers both browser plug-in and stand-alone versions of its Flash Player.
Although it's not unheard of for patches to not properly protect all versions of a particular program, Greenbaum said, it is unusual, and even more so when comparing the stand-alone and plug-in editions of an application.
Adobe was not immediately available to confirm Greenbaum's claims, but the Symantec researcher said that his team had been working with the Flash developer since yesterday on the problem. "This is the latest and greatest news," Greenbaum said.
The Flash Player is-or-isn't-at-risk story began Tuesday, when researchers at the SANS Institute's Internet Storm Center and Symantec raised an alarm about the exploit and said it was triggering an unknown, and unpatched, vulnerability in the popular plug-in and application.
Later yesterday, however, Symantec seemed to back off its initial analysis. "Originally, it was believed that this issue was unpatched and unknown, but further technical analysis has revealed that it is very similar to the previously reported Adobe Flash Player Multimedia File Remote Buffer Overflow Vulnerability (BID 28695), discovered by Mark Dowd of IBM," Symantec said in a explanation of why it had bumped its ThreatCon ranking to Level 2.
- Transforming Security: Designing a State-of-the-Art Extended Team The information security mission is no longer about implementing and operating controls.
- The Big Data Security Analytics Era Is Here New security risks and old security challenges often overwhelm legacy security controls and analytical tools.
- Building an Intelligence-Driven Security Operations Center The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions.
- Taking Charge of Security in a Hyperconnected World In today's highly interconnected business environment, information security can no longer be an isolated endeavor: it's the responsibility of an entire business ecosystem...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!