Adobe fixes 6 flaws in Flash
Issues fourth security update this year for Flash Player
Computerworld - For the second time in two days, Adobe Systems Inc. has warned users of multiple vulnerabilities in one of its most-popular programs and issued a security update to plug the holes.
Wednesday's update was the fourth patch job on the ubiquitous Flash Player this year, and followed by one day an even larger collection of fixes for Adobe Reader, the Web's default PDF application.
The Flash Player update addressed six bugs in Version 22.214.171.124 that run the range from cross-site scripting and information disclosure vulnerabilities to flaws that could be used to inject malicious HTML code in Web sites and launch "DNS rebinding" attacks.
Adobe first quashed DNS rebinding bugs in Flash in December 2007; the latest fix again credited researchers from Stanford University and the University of California, Berkeley, for reporting the flaw. DSN rebinding vulnerabilities, which make up a subset of cross-site scripting bugs, can let hackers circumvent firewalls and launch large-scale IP address hijacking attacks.
Another flaw fixed in the update also has a long history. "This update prevents an issue with the Flash Player interpretation of jar: protocol on Mozilla browsers that could potentially lead to information disclosure," Adobe said in one of the accompanying advisory's terse descriptions. Mozilla Corp. patched its Firefox browser nearly a year ago to crush a pair of bugs associated with the jar: protocol handler. At the time, the move was notable because Mozilla had let a fix languish for nine months.
Wednesday's update brought the older version of Flash to Version 126.96.36.199. Users running the newer Flash Player 10 do not need to update their software.
Users can check which version of Flash Player they currently have installed by visiting this page on the Adobe site.
Adobe last patched Flash on Oct. 15, when it unveiled Version 10.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts