Adobe admits Google fuzzing report led to 80 'code changes' in Flash Player
After spat with Google engineer, explains why it didn't spell out each bug
Computerworld - Adobe on Friday acknowledged that as many as 80 bugs in Flash Player were reported by a Google security engineer as it defended its decision not to spell out details of the vulnerabilities.
Google also cited the same number, apparently putting to rest the spat between the engineer, Tavis Ormandy, and Adobe.
In a pair of blog posts, Adobe and Google -- the former in more detail -- detailed how the number "400" that Ormandy had cited ended up being cut by 80%.
"The initial run of the ongoing [Google] effort resulted in about 400 unique crash signatures, which were logged as 106 individual security bugs following the initial triage," said Brad Arkin, Adobe's senior director of product security and privacy, in a blog post last week. "As these bugs were resolved, many were identified as duplicates that weren't caught during the initial triage. In the final analysis, the Flash Player update we shipped earlier this week contains about 80 code changes to fix these bugs."
Google's blog post, which was attributed to Chris Evans, Matt Moore and Ormandy -- all members of the company's security team -- used almost-identical language to describe the bug count culling. In the post, Google also said it had devoted 2,000 CPU cores over a four-week period to the massive "fuzzing" project directed at Flash.
Last week, Ormandy had questioned not only the bug total, but Adobe's decision not to list each of the vulnerabilities in the security bulletin that accompanied the update.
"To us, the joint projects we do with partners, including Google, are extensions of our internal security review and code hardening," said Arkin in an interview last Friday, echoing a statement the company made at the time.
Because it does not consider those flaws publicly known, Adobe does not assign them a CVE (Common Vulnerabilities and Exposures) designation, Arkin said. When it issued the Flash Player update and security bulletin, it listed just 13 CVEs; on Friday it added one more to account for those reported by Ormandy and Google.
"This update resolves multiple memory corruption vulnerabilities that could lead to code execution," Adobe stated in the new entry for CVE-2011-2424.
Normally, Adobe doesn't reveal a number associated with vulnerabilities it or its partners have found, and that have been patched. But Arkin acknowledged that it needed to do exactly that this time.
"With every release [of Flash Player] we do a lot of code hardening, but because there's been public discussion, this internal topic has become external," Arkin said.
Andrew Storms, director of security operations at nCircle Security, put that into plainer words. "They were forced to," said Storms.
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!