Adobe to patch 2-year-old Shockwave flaw next year
The flaws could allow remote code to be executed, one of the most severe kinds of vulnerabilities
IDG News Service - Adobe plans in February to close a dangerous hole in its Shockwave application that causes the application to be downgraded when a user launches older multimedia content, allowing hackers to target years-old vulnerabilities.
The U.S. Computer Emergency Readiness Team (U.S. CERT) issued an advisory on the vulnerability, which could allow an attacker to deliver malware and execute arbitrary code, considered to be one of the most dangerous kinds of flaws.
U.S. CERT notified Adobe of the problem on Oct. 27, 2010, but an Adobe spokesperson said Wednesday that the problem will be closed with the next major upgrade of Shockwave, scheduled for Feb. 12.
"We are not aware of any active exploits or attacks in the wild using this particular technique," said Wiebke Lips, senior manager with Adobe corporate communications. Adobe did not consider the issue a high risk to users.
Shockwave is used to play content created in Macromedia and Adobe Director, which offers advanced tools for creating interactive content, including Flash.
U.S. CERT cited Adobe documentation that says if a user encounters content that does not specify to use the latest Shockwave version 11, an older ActiveX control is downloaded that pulls components of the older Shockwave 10 player. Shockwave uses an ActiveX control when content is requested within Microsoft's Internet Explorer and is present as a plugin in other browsers, according to U.S. CERT.
The Shockwave 10 runtime contains vulnerabilities as well as the application's "Xtras," which are components of content. The downgrading of Shockwave to an older version also opens up Adobe's Flash multimedia application for attack, the agency said.
"Because of this design, attackers can simply target vulnerabilities in the Shockwave 10 runtime, or any of the Xtras provided by Shockwave 10," U.S. CERT wrote. "For example, the legacy version of Shockwave provides Flash 18.104.22.168, which was released on November 14, 2006 and contains multiple, known vulnerabilities."
U.S. CERT has published two other document describing the issues with Xtras and Flash, which Adobe said it is analyzing. The first concerns Shockwave's downgrading to an older Flash version, which affects both Windows and Apple's Mac. The second involves the problem of malicious Xtras.
"We are not aware of any active exploits or attacks in the wild using these techniques either," Lips said.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts