News

Adobe Confirms Zero-Day Hole Exploited by Hackers

Adobe has released a security advisory on a "critical" vulnerability in its Flash Player that could cause a system crash and allow for remote access by an attacker. Along with disclosing the vulnerability, Adobe has confirmed that the hole has already been taken advantage of by hackers.

"Reports that we've received thus far indicate the attack is targeted at a very small number of organizations and limited in scope," wrote Brad Arkin, senior director of product security and privacy at Adobe, in a blog posting. "The current attack leverages a malicious Flash (.SWF) file inside a Microsoft Excel (.XLS) file." He then wrote that the malicious files are being sent through e-mail and installed when opened.

Adobe disclosed that it hasn't seen any attacks delivered through a .PDF file as of yet, but warns that similar exploits can and have been transported in this fashion. In response, it has shipped an out-of-cycle update for Adobe Reader, Acrobat v9 and Acrobat X that should avoid this exploit from executing.

Those running Adobe Reader X on a Windows machine don't have to worry about the exploit due to the software's sandbox protection feature. "Adobe Reader X Protected Mode (aka "sandboxing") is designed to prevent the type of exploit we are currently seeing in the .SWF/.XLS attack from executing," said Arkin. "Even if an attacker made the transition to a .PDF container for the exploit, the sandbox would prevent the final step of malicious software installation on the victim's machine."

As for the vulnerability in its Flash Player, Adobe is currently in the process of finalizing a fix for the issue, which will come in the form of an update sometime during the week of March 21.

About the Author

Chris Paoli is the site producer for Redmondmag.com and MCPmag.com.

Featured

  • Microsoft Talks Teams and SharePoint at Modern Workplace Event

    It's a hybrid world, but remote work is here to stay, according to Microsoft's Teams and SharePoint head Jeff Teper.

  • Malwarebytes Affirms Other APT Attack Methods Used Besides 'Solorigate'

    Security solutions company Malwarebytes affirmed on Monday that alternative methods besides tainted SolarWinds Orion software were used in the recent "Solorigate" advanced persistent threat (APT) attacks.

  • How To Fix the Hyper-V Read Only Disk Problem

    DOS might seem like a relic now, but sometimes it's the only way to fix a problem that Windows seems ill-equipped to deal with -- like this one.

  • Microsoft Warns IT Pros on Windows Netlogon Fix Coming Next Month

    Microsoft on Thursday issued a reminder to organizations to ensure that their systems are properly patched for a "Critical"-rated Windows Netlogon vulnerability before next month's "update Tuesday" patch distribution arrives.

comments powered by Disqus