Hackers exploit newest Flash zero-day bug

Macworld Australia Staff
29 October, 2010
View more articles fromthe author

Adobe has confirmed that hackers are exploiting a critical unpatched bug in Flash Player, and has promised to patch the vulnerability in two weeks.

The company issued a security advisory today that also named Adobe Reader and Acrobat as vulnerable.

“There are reports that this vulnerability is being actively exploited in the wild against Adobe Reader and Acrobat,” said Adobe in its warning. The company said it’s seen no sign that hackers are also targeting Flash Player itself.

Those reports came from Mila Parkour, an independent security researcher who notified Adobe late yesterday after spotting and then analysing a malicious PDF file. According to Parkour, the rigged PDF document exploits the Flash bug in Reader, then drops a Trojan horse and other malware on the victimized machine.

Adobe said that all versions of Flash on Mac, Windows, Linux, and Android harboured the bug, and that the “Authplay” component of Reader and Acrobat 9.x and earlier also contained the flaw. Authplay is the interpreter that renders Flash content embedded within PDF files.

Last month, Parkour uncovered a bug in Reader’s font-rendering technology that was exploited by attack campaigns using bogus messages from renowned golf coach David Leadbetter as click bait.

Today’s vulnerability, however, is more reminiscent of one reported in June that also involved Authplay. Adobe issued an emergency patch for Flash Player within a week, and followed with a fix for Reader and Acrobat two weeks later.

Adobe will patch this newest bug in a similar fashion. Today it promised to issue a fix for Flash by November 9, and updates for Reader and Acrobat the following week.

Danish vulnerability tracker Secunia ranked the Flash flaw as “extremely critical”, its highest threat ranking, and said criminals could use it to compromise systems and execute malicious code.

Security experts have regularly criticised Adobe Flash’s security, with some questioning the company’s decision to integrate the media player’s capabilities within the almost-as-popular Reader. Adobe has countered those arguments with its own, saying that many users rely on the functionality.

Until a patch is available, Mac users can protect themselves from active attacks by removing an AuthPlayLib.bundle file from a location specified in Adobe’s security bulletin above. Windows users should delete the “authplay.dll” file that ships with Reader and Acrobat. The company gave the same advice in June when the earlier Flash vulnerability was reported.

Dumping authplay.dll, however, will crash Reader and Acrobat or produce an error message when the software opens a PDF file containing Flash content.

Today’s Flash flaw disclosure was the second Adobe has acknowledged since the technology was ported to Google’s Android operating system two months ago.

Although Adobe tries to adhere to a quarterly patch schedule for Reader and Acrobat, it’s repeatedly been forced to scuttle those plans to issue rush fixes for critical bugs. The next regularly-scheduled Reader update was not supposed to land until February 8, 2011.

At times, Adobe has abandoned scheduled Reader updates after shipping an “out-of-band” patch, but that’s unlikely here as the company is in the early days of its next patch cycle.

Leave a Comment

Please keep your comments friendly on the topic.

Contact us