Adobe to patch 2-year-old Shockwave flaw next year
The flaws could allow remote code to be executed, one of the most severe kinds of vulnerabilities
IDG News Service - Adobe plans in February to close a dangerous hole in its Shockwave application that causes the application to be downgraded when a user launches older multimedia content, allowing hackers to target years-old vulnerabilities.
The U.S. Computer Emergency Readiness Team (U.S. CERT) issued an advisory on the vulnerability, which could allow an attacker to deliver malware and execute arbitrary code, considered to be one of the most dangerous kinds of flaws.
U.S. CERT notified Adobe of the problem on Oct. 27, 2010, but an Adobe spokesperson said Wednesday that the problem will be closed with the next major upgrade of Shockwave, scheduled for Feb. 12.
"We are not aware of any active exploits or attacks in the wild using this particular technique," said Wiebke Lips, senior manager with Adobe corporate communications. Adobe did not consider the issue a high risk to users.
Shockwave is used to play content created in Macromedia and Adobe Director, which offers advanced tools for creating interactive content, including Flash.
U.S. CERT cited Adobe documentation that says if a user encounters content that does not specify to use the latest Shockwave version 11, an older ActiveX control is downloaded that pulls components of the older Shockwave 10 player. Shockwave uses an ActiveX control when content is requested within Microsoft's Internet Explorer and is present as a plugin in other browsers, according to U.S. CERT.
The Shockwave 10 runtime contains vulnerabilities as well as the application's "Xtras," which are components of content. The downgrading of Shockwave to an older version also opens up Adobe's Flash multimedia application for attack, the agency said.
"Because of this design, attackers can simply target vulnerabilities in the Shockwave 10 runtime, or any of the Xtras provided by Shockwave 10," U.S. CERT wrote. "For example, the legacy version of Shockwave provides Flash 18.104.22.168, which was released on November 14, 2006 and contains multiple, known vulnerabilities."
U.S. CERT has published two other document describing the issues with Xtras and Flash, which Adobe said it is analyzing. The first concerns Shockwave's downgrading to an older Flash version, which affects both Windows and Apple's Mac. The second involves the problem of malicious Xtras.
"We are not aware of any active exploits or attacks in the wild using these techniques either," Lips said.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success! All Cybercrime and Hacking White Papers | Webcasts