There is a newly discovered Flash/Adobe Reader vulnerability with a day zero exploit requiring no user interaction. All you need to do is visit a webpage with Flash on it (and I note that most ads are in Flash) with the exploit. There is no patch at this time.
Aspects of this vulnerability affect all Intel platforms with Flash, Adobe Reader, Acrobat, or other Flash-enabled software packages, including OSX and Linux. The currently-existing exploit has a payload; it is not just proof-of-concept.
eta: By "Intel platforms," I mean, "Intel instruction set platforms." That includes AMD, and is not a fault of the chipset. The exploit runs Intel/AMD instruction set code, so will of course be meaningless on PPC, Alpha, and so on.
Aspects of this vulnerability affect all Intel platforms with Flash, Adobe Reader, Acrobat, or other Flash-enabled software packages, including OSX and Linux. The currently-existing exploit has a payload; it is not just proof-of-concept.
eta: By "Intel platforms," I mean, "Intel instruction set platforms." That includes AMD, and is not a fault of the chipset. The exploit runs Intel/AMD instruction set code, so will of course be meaningless on PPC, Alpha, and so on.
no subject
Date: 2009-07-23 03:35 pm (UTC)no subject
Date: 2009-07-23 03:42 pm (UTC)Thanks for the heads up. I was looking for an excuse to disable Flash, anyway... c.c
I can't believe Adobe jammed flash into PDF, along with all the other crap they've been shoving in. It's like, wasn't anyone paying attention to the HTML email debacle in the '90s?
So.. yeah. Solution for AR is to delete or rename authplay.dll. Brilliant, guys, you didn't even provide an off switch. Fortunately, AR 8.x and earlier don't appear to be vulnerable.
I wonder if there's anyway to browbeat Adobe into running AR under Vista low integrity in Windows, like protected-mode IE? That's really where such a read-only, (untrustworthy) reader of untrusted documents belongs.
no subject
Date: 2009-07-23 03:56 pm (UTC)As long as no one manages to combine it with a clever bit of XSS to integrate it into youtube clips...
no subject
Date: 2009-07-23 03:59 pm (UTC)no subject
Date: 2009-07-23 04:05 pm (UTC)no subject
Date: 2009-08-19 04:16 am (UTC)no subject
Date: 2009-07-23 04:55 pm (UTC)no subject
Date: 2009-07-23 05:50 pm (UTC)no subject
Date: 2009-07-23 06:04 pm (UTC)no subject
Date: 2009-07-24 05:32 am (UTC)no subject
Date: 2009-07-24 06:50 am (UTC)no subject
Date: 2009-07-24 07:26 am (UTC)no subject
Date: 2009-07-24 11:00 am (UTC)no subject
Date: 2009-07-24 03:18 pm (UTC)no subject
Date: 2009-07-24 03:28 pm (UTC)Ars Technica (http://arstechnica.com/security/news/2009/07/flash-security-vulnerability-exploited-in-pdfs.ars) just said it was only Windows. No idea how reliable they are in this kind of situation though.
no subject
Date: 2009-08-19 04:25 am (UTC)no subject
Date: 2009-08-19 04:24 am (UTC)no subject
Date: 2009-07-23 05:26 pm (UTC)no subject
Date: 2009-07-23 05:34 pm (UTC)no subject
Date: 2009-07-23 05:50 pm (UTC)no subject
Date: 2009-07-23 07:06 pm (UTC)no subject
Date: 2009-07-23 07:50 pm (UTC)no subject
Date: 2009-08-19 04:32 am (UTC)no subject
Date: 2009-07-23 10:19 pm (UTC)no subject
Date: 2009-07-24 12:44 am (UTC)no subject
Date: 2009-07-24 05:27 am (UTC)no subject
Date: 2009-08-19 04:35 am (UTC)which is why it's being suggested to do untrusted zone browsing on "less exploitatable" systems...
Date: 2009-08-03 11:35 pm (UTC)MY favorite lowest risk is a computer running Livedistro Linuxes totally in RAM with NO persistent local storage possibility. Yeah, there's the tinfoil hat nags about BIOS/Printer Spool HD's etc or forgetting about your PDA/Phone charging on the USB port as exploit fodder. But in the real world? Booting up from a smallish Distro like Damn Small or Puppy on a machine you've stripped of all persistent memory devices within reason is your "Least Risk" path:>
Defcon and it's familial cons are sadly where many Zero Day exploits get FORCED correction by vendors. Savvy vendors seeking to beat the presentation of the exploit by having a patch in place... And it's a safe bet that many attending Def etc will be physically removing their HD before boarding the plane to NV even:>
But- You're still at risk for all the other information leak/exploits that are not preventable even by running a Ramdisked distro...