Vulnerabilities

Adobe Pushes Emergency Flash Player Security Fix

Security Resource: Vulnerabilit

<p style="text-align: right;"><span style="color: #333333; line-height: 20px;"><strong><span style="text-decoration: underline;">Security Resource:</span></strong><span style="text-decoration: underline;"> </span><span style="text-decoration: underline;"><a href="http://clk.ml-links.com/clk?pub=176&pgr=315&src=3577&ctg=15&tgt=1898&tstamp=20110714T134128&ast=14146&cmp=3513&crv=12760&pos=2&frm=498&yld=0" target="_blank" title="Vulnerability Management Buyer's Checklist" style="font-weight: bold; text-decoration: none; color: #0076b4;" rel="noopener">Vulnerabilit

Security Resource: Vulnerability Management Buyer’s Checklist: Key Questions to Ask

As expected, Adobe today released a security update for its Flash Player. The out of cycle update addresses critical security issues in flash player as well as an important universal cross-site scripting issue.

The critical vulnerabilities have been identified in Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.186.6 and earlier versions for Android. These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.

Adobe reported that one of the vulnerabilities (CVE-2011-2444) is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message.

Adobe’s Severity Rating System classifies “Critical” security issues as “a vulnerability, which, if exploited would allow malicious native-code to execute, potentially without a user being aware.”

With hackers capitalizing on newly discovered vulnerabilities faster than ever, it’s important for vendors to respond with fixes as soon as possible, and for end users and administrators to install the patches immediately.

To illustrate the importance of keeping systems up to date, including Adobe Flash products, the fact that the RSA cyber attack was executed using a spear phishing attack with an embedded flash file should serve as a friendly reminder. RSA was breached after an employee opened a spreadsheet that contained a zero-day exploit that installed a backdoor through an Adobe Flash vulnerability.

Just last week in a rare move, Oracle broke its normal procedures and issued an emergency patch due to concerns about the impact of a successful attack.

Security Resource: Vulnerability Management Buyer’s Checklist: Key Questions to Ask

Advertisement. Scroll to continue reading.

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version