Vulnerabilities / Threats

2/1/2018
05:50 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Adobe to Patch Flash Zero-Day Discovered in South Korean Attacks

Critical use-after-free vulnerability being used in targeted attacks.

A previously unknown and critical flaw in Adobe Flash found being exploited in targeted attacks against victims in South Korea will be patched the week of February 5.

Adobe today confirmed a report yesterday by South Korea's Computer Emergency Response Team (KrCERT/CC) of the discovery of the zero-day vulnerability in Flash Player ActiveX 28.0.0.137 and earlier versions. The bug (CVE-2018-4878) abused in the attacks is a use-after-free vulnerability that allows remote code execution, according to Adobe's advisory.

Johannes Ullrich, head of the SANS Internet Storm Center, says the fact that this was a targeted, zero-day attack makes it more likely to be the handiwork of a nation-state actor.

"The attack was rather limited, and targeted at individuals in South Korea who are involved in research about North Korea. I think this makes for a pretty strong case that this was a nation-state sponsored attack. Other actors would have little motivation to use a zero-day exploit in an attack against a group like this," Ullrich says. "On the other hand, it doesn't have to be North Korea," given the difficulty of attribution.

A researcher from South Korea in a tweet today said North Korea was behind the attacks, and the victims all conduct research on North Korea. Simon Choi, who is director of the security research center at Hauri, said the zero-day exploit had been in use since mid-November by North Korea. 

John Bambenek, manager of threat systems at Fidelis Cybersecurity, says the ideological theme of the attacks' targeting could mean the Lazarus Group is behind the attacks, but it's difficult to discern without the technical details from the South Korean CERT. Even so, the Lazarus Group isn't known for employing homegrown zero-day exploits, he says.

The Flash vulnerability was spotted targeting Windows users via emails with Office documents that contain embedded and malware-laden Flash content. "Successful exploitation could potentially allow an attacker to take control of the affected system," according to Adobe's advisory.

While awaiting the patch, an attack can be mitigated by configuring Flash Player 27 and above on Windows 7 and below (running Internet Explorer) to prompt the user before playing Flash content. Protected View for Office also can be set up for Windows that marks files as potentially unsafe, leaving them in Read-Only mode for users, Adobe noted in its advisory.

Products affected by the vulnerability include Adobe's Flash Player Desktop Runtime on Windows and Mac; Flash Player for Google Chrome on Windows, Mac, Linux, and Chrome OS; Flash for Microsoft Edge and Internet Explorer 11 on Windows 10 and 8.1; and Flash Player Desktop Runtime on Linux.

Related Content:

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.