Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Vulnerability Management

1/26/2015
12:15 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

Adobe Fixes Second Flash Flaw Exploited By Angler

Second 0-day fix addresses UAF vulnerability.

Adobe this weekend released its second emergency zero-day patch for Flash in a single week: this one in fulfillment of a promise to address another vulnerability recently discovered to have been exploited in the wild by the Angler malware kit. Available at this time only through the auto-update utility for Flash, the update will be made available for manual download later this week, according to the Adobe Product Security Incident Response Team (PSIRT).

"Adobe expects to have an update available for manual download during the week of January 26, and we are working with our distribution partners to make the update available in Google Chrome and Internet Explorer 10 and 11," Adobe's PSIRT team wrote on Saturday.

First spotlighted by security researcher Kafeine in a blog post last week, CVE-2015-0311 is the vulnerability alluded to by Adobe when it fixed CVE-2015-0310 last Thursday.

"We are aware of reports that this vulnerability is being actively exploited in the wild via drive-by-download attacks against systems running Internet Explorer and Firefox on Windows 8.1 and below," Adobe's PSIRT team reported.

Like the first vulnerability, CVE-2015-0311 is actively exploited in Angler as well as other malware families like Troj/Bedep, according to Sophos researchers.

A post by TrendMicro Labs this morning shows that this particular vulnerability looks very similar to another one for which Adobe released an emergency patch in late November.

"It is possible that the same person is responsible for both exploits," wrote Peter Pi, threats analyst for Trend, who explains that this latest exploit is a use-after-free (UAF) vulnerability. "In this case, the memory referenced by domainMemory is freed. This vulnerability can be used to write into memory; an attacker can use this ability to run arbitrary code."

Users who must wait for a manual download version of this patch, along with integrated plug-in support for Internet Explorer and Chrome, are advised to consider uninstalling or disabling Flash until Adobe issues the update. If Flash is required, consider additional mitigation measures, such as putting Flash in "Ask" or "Ask to Activate" mode, says Paul Ducklin of Sophos.

"This helps you restrict Flash to sites where you know you need it, so an unknown, hacked site will not be able to run malicious Flash in your browser invisibly," he writes, also recommending that organizations turn on HIPS if it is available through their antivirus package. 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
1/27/2015 | 11:48:05 AM
Patch is ready now from Adobe
http://helpx.adobe.com/security/products/flash-player/apsb15-03.html
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3460
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version 2.0.0.301, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
CVE-2021-3462
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could allow unauthorized access to the driver's device object.
CVE-2021-3463
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could cause systems to experience a blue screen error.
CVE-2021-3471
PUBLISHED: 2021-04-13
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2021-3473
PUBLISHED: 2021-04-13
An internal product security audit of Lenovo XClarity Controller (XCC) discovered that the XCC configuration backup/restore password may be written to an internal XCC log buffer if Lenovo XClarity Administrator (LXCA) is used to perform the backup/restore. The backup/restore password typically exist...