Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Adobe Issues Flash Player Security Update to Block Attacks

Adobe Systems plugged multiple security holes in Flash Player that today have come under attack in the wild, marking the third security update issued for the product this month.

Adobe Systems plugged multiple security holes in Flash Player that today have come under attack in the wild, marking the third security update issued for the product this month.

The security update – which touches Windows, Mac OS X and Linux computers – comes after reports that CVE-2013-0643 (a permissions issue in the Flash Player Firefox sandbox) and CVE-2013-0648 (a vulnerability in the ExternalInterface ActionScript feature) were found being targeted in attacks targeting Firefox users. According to Adobe, the attackers look to trick users into clicking a link that directs them to a website serving malicious Flash content.

If exploited successfully, an attacker could use the vulnerabilities to either crash or take control of a vulnerable system, the company said.

In addition to those two bugs, Adobe also fixed a buffer overflow issue in a Flash Player broker service that can be used to execute malicious code (CVE-2013-0504).

Today’s update is part of what has been a busy month for Flash Player security. On Feb. 7, the company released a fix for two other vulnerabilities being exploited in attacks. Less than a week later, Adobe released another update for Flash Player to address several vulnerabilities in the product that could cause a crash or enable an attacker to hijack a system.

For Windows and Mac users, today’s update was assigned a priority rating of ‘1’ – the highest rating available.

Related Podcast: David Lenoe, Adobe’s PSIRT group manager, talks about the frustrations of responding to the “partial disclosure” of security vulnerabilities.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.