Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/1/2018
05:50 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Adobe to Patch Flash Zero-Day Discovered in South Korean Attacks

Critical use-after-free vulnerability being used in targeted attacks.

A previously unknown and critical flaw in Adobe Flash found being exploited in targeted attacks against victims in South Korea will be patched the week of February 5.

Adobe today confirmed a report yesterday by South Korea's Computer Emergency Response Team (KrCERT/CC) of the discovery of the zero-day vulnerability in Flash Player ActiveX 28.0.0.137 and earlier versions. The bug (CVE-2018-4878) abused in the attacks is a use-after-free vulnerability that allows remote code execution, according to Adobe's advisory.

Johannes Ullrich, head of the SANS Internet Storm Center, says the fact that this was a targeted, zero-day attack makes it more likely to be the handiwork of a nation-state actor.

"The attack was rather limited, and targeted at individuals in South Korea who are involved in research about North Korea. I think this makes for a pretty strong case that this was a nation-state sponsored attack. Other actors would have little motivation to use a zero-day exploit in an attack against a group like this," Ullrich says. "On the other hand, it doesn't have to be North Korea," given the difficulty of attribution.

A researcher from South Korea in a tweet today said North Korea was behind the attacks, and the victims all conduct research on North Korea. Simon Choi, who is director of the security research center at Hauri, said the zero-day exploit had been in use since mid-November by North Korea. 

John Bambenek, manager of threat systems at Fidelis Cybersecurity, says the ideological theme of the attacks' targeting could mean the Lazarus Group is behind the attacks, but it's difficult to discern without the technical details from the South Korean CERT. Even so, the Lazarus Group isn't known for employing homegrown zero-day exploits, he says.

The Flash vulnerability was spotted targeting Windows users via emails with Office documents that contain embedded and malware-laden Flash content. "Successful exploitation could potentially allow an attacker to take control of the affected system," according to Adobe's advisory.

While awaiting the patch, an attack can be mitigated by configuring Flash Player 27 and above on Windows 7 and below (running Internet Explorer) to prompt the user before playing Flash content. Protected View for Office also can be set up for Windows that marks files as potentially unsafe, leaving them in Read-Only mode for users, Adobe noted in its advisory.

Products affected by the vulnerability include Adobe's Flash Player Desktop Runtime on Windows and Mac; Flash Player for Google Chrome on Windows, Mac, Linux, and Chrome OS; Flash for Microsoft Edge and Internet Explorer 11 on Windows 10 and 8.1; and Flash Player Desktop Runtime on Linux.

Related Content:

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-33033
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
CVE-2021-33034
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
CVE-2019-25044
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
CVE-2020-24119
PUBLISHED: 2021-05-14
A heap buffer overflow read was discovered in upx 4.0.0, because the check in p_lx_elf.cpp is not perfect.
CVE-2020-27833
PUBLISHED: 2021-05-14
A Zip Slip vulnerability was found in the oc binary in openshift-clients where an arbitrary file write is achieved by using a specially crafted raw container image (.tar file) which contains symbolic links. The vulnerability is limited to the command `oc image extract`. If a symbolic link is first c...