Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43438
  • Total Topics: 16532
  • Online today: 3056
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 3
Guests: 2899
Total: 2902









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 16. April 2011., 19:41:07 »


Less than a week after warning that hackers were embedding malicious Flash Player files (.swf) into Microsoft Word documents to launch targeted malware attacks, Adobe plans to release an emergency Flash Player patch today to fix the underlying problem.

The patch will fix a “critical” vulnerability in Flash Player 10.2.153.1 and earlier versions for Windows, Mac OS X Linux and Solaris.

According to this Secunia advisory: http://secunia.com/advisories/44119/ , the flaw allows a hacker to completely hijack a vulnerable Windows computer:

A vulnerability has been reported in Adobe Flash Player, which can be exploited by malicious people to compromise a user’s system.

The vulnerability is caused due to an error when parsing ActionScript that adds a custom function to the prototype of a predefined class. This results in incorrect interpretation of an object (i.e. object type confusion) when calling the custom function, which causes an invalid pointer to be dereferenced.


Secunia has posted a technical analysis of the flaw as well: http://secunia.com/blog/210

Adobe has confirmed that the vulnerability (CVE-2011-0611) could cause a crash and potentially allow an attacker to take control of the affected system.

There are reports that this vulnerability is being exploited in the wild in targeted attacks via a malicious Web page or a Flash (.swf) file embedded in a Microsoft Word (.doc) or Microsoft Excel (.xls) file delivered as an email attachment, targeting the Windows platform. At this time, Adobe is not aware of any attacks via PDF targeting Adobe Reader and Acrobat. Adobe Reader X Protected Mode mitigations would prevent an exploit of this kind from executing.

A patch for Google Chrome users is already available in Chrome version 10.0.648.205: http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html

Adobe plans to fix the vulnerability in Adobe Acrobat and Adobe Reader at a later date.

(ZDnet)
Posted by: Samker
« on: 13. April 2011., 07:53:20 »


Adobe has promised to update its Flash media player to patch a critical vulnerability that is being exploited in targeted attacks to install malware on end user machines.

The attacks are being launched using emails that attach a Microsoft Word document that contains a booby-trapped Flash file, according to a blog post published on Monday by independent security researcher Mila Parkour: http://contagiodump.blogspot.com/2011/04/apr-8-cve-2011-0611-flash-player-zero.html
Clicking on the document causes Windows-based machines to install a backdoor known as Zolpiq, separate researchers from antivirus provider Kaspersky said: http://www.securelist.com/en/blog/6182/Another_Adobe_Flash_zero_day

“Given the interest on the list in China's Anti-Monopoly Law, the current issue of the ABA Antitrust Section's Antitrust Source may be of interest,” the email, which contains no spelling mistakes or glaring grammatical errors states. Copies of the message were sent as recently as Friday to unknown people, Parkour's post indicates.


*Copy of email exploiting critical Adobe Flash vulnerability


Just 1 of the 42 top antivirus products detected the threat, according to a VirusTotal analysis conducted over the weekend: http://www.virustotal.com/file-scan/report.html?id=1e677420d7a8160c92b2f44f1ef5eea1cf9b0b1a25353db7d3142b268893507f-1302359653 , and even that was a false positive for an unrelated piece of malware. Adobe officials said they're unaware of any exploits that directly target the vulnerability in its Flash or Reader applications.

Adobe didn't say when the fixes would arrive for Flash, but said it won't be able to fix the vulnerability in Reader for Windows until June 14. Reader for Linux and Solaris, and for phones running Google's Android operating system aren't vulnerable.

Word of the in-the-wild attacks comes one month after Adobe warned of similar attacks that targeted a separate Flash vulnerability. In both cases, the attackers embedded the malicious SWF file in a Microsoft Office document, presumably because a security sandbox recently added to Windows versions of the document viewer prevents the attackers from executing code on would-be victim's computers.

Those who have a legitimate need to embed Flash content in Word and Excel documents are almost certainly in the minority. With SWF exploits piggybacking on Office files for the second time in as many months, it's time for Microsoft to quickly figure out how to let users disable SWF content from all Office documents.

It's not clear if the attacks work against newer versions of Office, which come with security protections such as Address Space Layout Randomization designed to prevent the execution of malicious code.

(ElReg)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023