Security Experts:

Adobe Flash Zero-Day Under Attack

A zero-day vulnerability in Adobe’s ubiquitous Flash Player software is being exploited to launch malware attacks, the company warned in an advisory issued today.

The vulnerability, rated critical, will not be patched until May 12th.

The company credits Genwei Jiang of FireEye, Inc. with discovering the flaw, which provides an indication that it is being used in targeted attacks.

According to Adobe, the vulnerability is present in Windows, Mac OS X, Linux and Chrome OS.

From the Adobe advisory:

A critical vulnerability (CVE-2016-4117) exists in Adobe Flash Player and earlier versions for Windows, Macintosh, Linux, and Chrome OS. Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system.

Adobe is aware of a report that an exploit for CVE-2016-4117 exists in the wild.  Adobe will address this vulnerability in our monthly security update, which will be available as early as May 12.  

Separately, Adobe issued a patch for three different vulnerabilities in the ColdFusion application server platform.

The company said the flaws could expose users to cross-site scripting, input validation and host name verification attacks.

Adobe also issued a massive patch rollup for the Adobe Acrobat and Adobe Reader product lines. 

view counter
Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. Ryan is a journalist and cybersecurity strategist with more than 20 years experience covering IT security and technology trends. He is a regular speaker at cybersecurity conferences around the world. Ryan has built security engagement programs at major global brands, including Intel Corp., Bishop Fox and Kaspersky GReAT. He is a co-founder of Threatpost and the global SAS conference series. Ryan's career as a journalist includes bylines at major technology publications including Ziff Davis eWEEK, CBS Interactive's ZDNet, PCMag and PC World. Follow Ryan on Twitter @ryanaraine.