Overview
Adobe Flash contains a vulnerability that may allow an attacker to run code on a system that has a vulnerable version of the Flash player installed. There are reports that this vulnerability is being actively exploited.
Description
The Adobe Flash Player is a player for the Flash media format and enables frame-based animations and multimedia to be viewed within a web browser. |
Impact
A remoted, unauthenticated attacker may be able to execute arbitrary code. |
Solution
Update This issue has been addressed in the most recent version (9.0.124.0) of Adobe Flash. Microsoft Windows users should browse to the Adobe Flash Player Support Center downloads and install the most recent version of Flash site using Internet Explorer, then repeat the process for all other installed browsers (Firefox, Opera, Safari, etc). Systems that are not running Windows should be updated by going to the Adobe Flash Player Support Center downloads and installing the most recent version of Flash with all each web browser on the system. |
Workarounds for users running Internet Explorer
Workarounds for network administrators
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash
- http://www.adobe.com/products/flash/about/
- http://isc.sans.org/diary.html?storyid=4465
- http://blogs.adobe.com/psirt/2008/05/potential_flash_player_issue.html
- http://www.kb.cert.org/vuls/id/159523
- http://www.securityfocus.com/bid/29386
- http://noscript.net/
- http://www.stopbadware.org/home/security
- http://www.owasp.org/index.php/Web_Application_Firewall
- http://ddanchev.blogspot.com/2008/05/malware-attack-exploiting-flash-zero.html
- http://www.symantec.com/security_response/threatcon/index.jsp
- http://www.netfilter.org/documentation/HOWTO//netfilter-extensions-HOWTO-3.html#ss3.18
- http://www.visolve.com/squid/squid24s1/access_controls.php
- http://kb.adobe.com/selfservice/viewContent.do?externalId=tn_4151
Acknowledgements
Thanks to SANS for information that was used in this report.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | None |
Severity Metric: | 65.81 |
Date Public: | 2008-05-27 |
Date First Published: | 2008-05-27 |
Date Last Updated: | 2008-06-09 12:40 UTC |
Document Revision: | 38 |