Risk
5/13/2011
04:34 PM
50%
50%

Adobe Adds Flash Privacy Controls

Flash Player and Google Chrome get patches against attacks currently seen in the wild.

Recommended Reading:
-- Adobe Flash Attacks Exploit Zero-Day Vulnerability
-- Online Privacy Battles Advertising Profits

Adobe is aiming to make Flash safer for users, in part by blocking questionable website-tracking practices.

The company on Thursday released Flash Player version 10.3, which now enables users to wipe the data stored by Flash from within the browser. That capability is designed to help people block the use of persistent Flash cookies--also known as Local Shared Objects (LSOs)--which some advertisers use to surreptitiously track every website that a user visits, regardless of their cookie or cache settings.

The new plug-in-wiping feature is facilitated by an API known as NPAPI:ClearSiteData. "This new API allows the browsers to communicate a user's desire to wipe user data stored by installed browser plug-ins. Now, when users go into their browser settings to clear their browser history or clear their cookies, they will be able to clear both their browser data as well as their plug-in data," according to a blog post from Adobe.

Any browser plug-in can use the new API, though Flash is the first to do so. For open source browsers, the functionality is currently only available for Chrome developers, but Adobe said "we expect to have official support across all open source browsers in the near future." Meanwhile, Adobe also worked with Microsoft to develop an equivalent capability--now live--for Internet Explorer 8 and 9.

The use of persistent Flash cookies, however, may be waning. Adobe pointed to a January 2011 report from Carnegie Mellon University, commissioned by Adobe, which found that only two of the top 100 websites were using Flash cookies. A check of 500 websites randomly selected from a list of the million most popular sites in the U.S. found none. Interestingly, both of the sites that were using Flash cookies discontinued the practice, one on its own, and one after being contacted by the Center for Democracy and Technology, which helped with the study.

The updated Flash Player also patches multiple critical vulnerabilities present in Flash Player 10.2 for Windows, Macintosh, Linux, Solaris, and Android. "These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system," according to Adobe's security bulletin.

Related attacks utilizing Microsoft Word and Excel files with a malicious Flash (.swf) file embedded in them have been seen in the wild, targeting Windows. "However, to date, Adobe has not obtained a sample that successfully completes an attack," it said.

The revamped Flash Player also adds an operating system control panel--in Windows, Apple OS X, and Linux operating systems--for tweaking all Flash settings. Adobe said it's also introduced an automatic update notification for Macintosh users, which Windows users already had. "In the past, Mac users often had trouble keeping up with Flash Player updates since the Mac OS and Flash Player ship schedules are not in sync," Adobe said.

The Flash Player update has already been built into the latest version of Google Chrome, also released on Thursday. That version of Chrome also patches two critical vulnerabilities, one involving WebKit, the other involving scalable vector graphics filters. Both of the issues were discovered by Google.

According to vulnerability information service Vupen, the vulnerabilities relate to "integer overflows and memory corruptions in WebKit and Flash, which could be exploited by remote attackers to compromise a vulnerable system by convincing a user to visit a specially crafted Web page."

Interestingly, Vupen and Google are still tussling over Vupen's assertion that it hacked Chrome's sandbox from within the browser itself, using two zero-day vulnerabilities. But Google information security engineer and "full-disclosure" aficionado Tavis Ormandy said via a Twitter post that "Vupen misunderstood how sandboxing worked in chrome, and only had a flash bug."

For the moment, Vupen has only released details of the vulnerability to its government customers.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4692
Published: 2015-07-27
The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.

CVE-2015-1840
Published: 2015-07-26
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space cha...

CVE-2015-1872
Published: 2015-07-26
The ff_mjpeg_decode_sof function in libavcodec/mjpegdec.c in FFmpeg before 2.5.4 does not validate the number of components in a JPEG-LS Start Of Frame segment, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via craft...

CVE-2015-2847
Published: 2015-07-26
Honeywell Tuxedo Touch before 5.2.19.0_VA relies on client-side authentication involving JavaScript, which allows remote attackers to bypass intended access restrictions by removing USERACCT requests from the client-server data stream.

CVE-2015-2848
Published: 2015-07-26
Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch before 5.2.19.0_VA allows remote attackers to hijack the authentication of arbitrary users for requests associated with home-automation commands, as demonstrated by a door-unlock command.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!