Risk
5/13/2011
04:34 PM
50%
50%

Adobe Adds Flash Privacy Controls

Flash Player and Google Chrome get patches against attacks currently seen in the wild.

Recommended Reading:
-- Adobe Flash Attacks Exploit Zero-Day Vulnerability
-- Online Privacy Battles Advertising Profits

Adobe is aiming to make Flash safer for users, in part by blocking questionable website-tracking practices.

The company on Thursday released Flash Player version 10.3, which now enables users to wipe the data stored by Flash from within the browser. That capability is designed to help people block the use of persistent Flash cookies--also known as Local Shared Objects (LSOs)--which some advertisers use to surreptitiously track every website that a user visits, regardless of their cookie or cache settings.

The new plug-in-wiping feature is facilitated by an API known as NPAPI:ClearSiteData. "This new API allows the browsers to communicate a user's desire to wipe user data stored by installed browser plug-ins. Now, when users go into their browser settings to clear their browser history or clear their cookies, they will be able to clear both their browser data as well as their plug-in data," according to a blog post from Adobe.

Any browser plug-in can use the new API, though Flash is the first to do so. For open source browsers, the functionality is currently only available for Chrome developers, but Adobe said "we expect to have official support across all open source browsers in the near future." Meanwhile, Adobe also worked with Microsoft to develop an equivalent capability--now live--for Internet Explorer 8 and 9.

The use of persistent Flash cookies, however, may be waning. Adobe pointed to a January 2011 report from Carnegie Mellon University, commissioned by Adobe, which found that only two of the top 100 websites were using Flash cookies. A check of 500 websites randomly selected from a list of the million most popular sites in the U.S. found none. Interestingly, both of the sites that were using Flash cookies discontinued the practice, one on its own, and one after being contacted by the Center for Democracy and Technology, which helped with the study.

The updated Flash Player also patches multiple critical vulnerabilities present in Flash Player 10.2 for Windows, Macintosh, Linux, Solaris, and Android. "These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system," according to Adobe's security bulletin.

Related attacks utilizing Microsoft Word and Excel files with a malicious Flash (.swf) file embedded in them have been seen in the wild, targeting Windows. "However, to date, Adobe has not obtained a sample that successfully completes an attack," it said.

The revamped Flash Player also adds an operating system control panel--in Windows, Apple OS X, and Linux operating systems--for tweaking all Flash settings. Adobe said it's also introduced an automatic update notification for Macintosh users, which Windows users already had. "In the past, Mac users often had trouble keeping up with Flash Player updates since the Mac OS and Flash Player ship schedules are not in sync," Adobe said.

The Flash Player update has already been built into the latest version of Google Chrome, also released on Thursday. That version of Chrome also patches two critical vulnerabilities, one involving WebKit, the other involving scalable vector graphics filters. Both of the issues were discovered by Google.

According to vulnerability information service Vupen, the vulnerabilities relate to "integer overflows and memory corruptions in WebKit and Flash, which could be exploited by remote attackers to compromise a vulnerable system by convincing a user to visit a specially crafted Web page."

Interestingly, Vupen and Google are still tussling over Vupen's assertion that it hacked Chrome's sandbox from within the browser itself, using two zero-day vulnerabilities. But Google information security engineer and "full-disclosure" aficionado Tavis Ormandy said via a Twitter post that "Vupen misunderstood how sandboxing worked in chrome, and only had a flash bug."

For the moment, Vupen has only released details of the vulnerability to its government customers.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
8 Key Building Blocks for Enterprise Network Defense
Networks are changing rapidly -- and so are strategies for protecting them. This Tech Digest looks at the fundamentals for the next-gen environment.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In this episode of Dark Reading Radio, veteran CISOs will share their experience and insight into how organizations can get the best bang for their security buck.