Overview
Adobe Flash contains a vulnerability in the handling of the ActionScript newfunction instruction, which can allow a remote, unauthenticated attacker to execute arbitrary code.
Description
Adobe Flash 9 and later versions support ActionScript 3, which is executed by the ActionScript Virtual Machine 2 (AVM2). The AVM2 takes ActionScript Bytecode (ABC) as input, and it is just-in-time (JIT) compiled into processor-specific instructions. Certain malformed use of the AVM2 newfunction instruction can result in an exploitable crash. This vulnerability affects Flash Player 9 through 10.0.45.2. Adobe Reader 9, Acrobat 9, and other Adobe products (including Photoshop CS3, PhotoShop Lightroom, Freehand MX, Fireworks) provide Flash support independent of Flash Player. This vulnerability is being exploited in the wild. Exploit code for this vulnerability is publicly available. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), PDF file, Microsoft Office document, or any other document that supports embedded SWF content, an attacker may be able to execute arbitrary code. |
Solution
Apply an update |
Disable Flash in your web browser
Prevent Internet Explorer from automatically opening PDF documents The installer for Adobe Reader and Acrobat configures Internet Explorer to automatically open PDF files without any user interaction. This behavior can be reverted to the safer option of prompting the user by importing the following as a .REG file: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\AcroExch.Document.7] "EditFlags"=hex:00,00,00,00 Disable the displaying of PDF documents in the web browser Preventing PDF documents from opening inside a web browser reduces the attack surface. If this workaround is applied to updated versions of Adobe Reader and Acrobat, it may protect against future vulnerabilities. To prevent PDF documents from automatically being opened in a web browser with Adobe Reader:
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 9 | AV:N/AC:M/Au:N/C:C/I:C/A:P |
Temporal | 7 | E:POC/RL:OF/RC:C |
Environmental | 7 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- http://www.adobe.com/support/security/bulletins/apsb10-14.html
- http://www.adobe.com/support/security/advisories/apsa10-01.html
- http://www.adobe.com/devnet/actionscript/articles/avm2overview.pdf
- http://labs.adobe.com/technologies/flashplayer10/
- http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/
- http://www.symantec.com/connect/blogs/analysis-zero-day-exploit-adobe-flash-and-reader
- http://community.websense.com/blogs/securitylabs/archive/2010/06/09/having-fun-with-adobe-0-day-exploits.aspx
- http://secunia.com/advisories/40026
- http://www.f-secure.com/weblog/archives/00001962.html
- http://blogs.technet.com/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx
- http://blogs.technet.com/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx
Acknowledgements
This vulnerability was reported by Will Dormann of the CERT/CC. It has also been independently discovered and exploited in the wild.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2010-1297 |
Severity Metric: | 43.09 |
Date Public: | 2010-06-04 |
Date First Published: | 2010-06-07 |
Date Last Updated: | 2012-03-28 14:47 UTC |
Document Revision: | 47 |