back to article Adobe warns of attacks exploiting critical Flash flaw

Adobe has promised to update its Flash media player to patch a critical vulnerability that is being exploited in targeted attacks to install malware on end user machines. The attacks are being launched using emails that attach a Microsoft Word document that contains a booby-trapped Flash file, according to a blog post published …

COMMENTS

This topic is closed for new posts.
  1. Steven Raith
    FAIL

    what idiots....

    Are putting SWF content in Office docs. After all, surely office covers...oh, sorry...

    Steven R

    1. BristolBachelor Gold badge

      Idiots ?

      I'm not sure I'd call them idiots; they managed to pwn RSA after all :)

  2. Anonymous Coward
    Stop

    What, again??

    Sooner we're rid of this proprietary Flash nonsense the better!

    1. Anonymous Coward
      Megaphone

      The sooner....

      We rid the office of overblown presentations with stupid graphics then a lot more proper work will get done around here.

  3. Anonymous Coward
    Anonymous Coward

    June 14th?

    Sounds like an awfully exact date.

    1. This post has been deleted by its author

  4. Goat Jam
    FAIL

    Good Grief

    "it's time for Microsoft to quickly figure out how to let users disable SWF content from all Office documents"

    Actually, it is time to ask ourselves why we are using productivity software that has the *ability* to embed things like Flash inside text documents in the first place.

    What is the use case for Word+Flash exactly?

  5. Gerrit Hoekstra
    Pirate

    The End is neigh, Flash!

    Repent and confess to the Gospel of St. HTML5, ye sinners!

  6. Anonymous Coward
    Jobs Halo

    Jobs proved Right ?

    Smartphones won't be affected (obviously, they don't run Office) - however, there is no mention if Office on the Mac is vulnerable.

    Flash. Is it really worth it any more ? HTML5 - will it be any safer ?

    I watched one of the Feynman lectures via Silverlight last night (Project Tuva) - whatever happened to Silverlight ?

  7. Stu 18
    Stop

    What, Again??

    Sooner we're rid of this proprietary XXXXX Microsoft Office nonsense the better!

  8. Snapper
    Jobs Halo

    WTF!

    "In both cases, the attackers embedded the malicious SWF file in a Microsoft Office document, presumably because a security sandbox recently added to Windows versions of the document viewer prevents the attackers from executing code on would-be victim's computers".

    I read this and I thought that someone should get a grip. The vast majority of Windows users are quite happily running Flash several versions (or years) behind the latest one.

    1. This post has been deleted by its author

  9. 0laf
    Flame

    Just another day

    I don't remember seeing any headlines or articles recently that don't mention "critical vulnerability" shortly after "Adobe".

    Oh and Adobe, I do so love having to regularly download a 100Mb files to open a glorified text message. You make Microsoft code seem svelte and minimalistic. Foxit for me.

  10. The BigYin

    Urf

    Why are people automatically granting unknown attachments execute rights?

    Oh, wait. This is Windows. Having everything ready to run and wide open to be exploited is normal.

    This may explain why the *nix are not affected.

    Even on Windows one can drop the permits to just "Read". Why is this not the default state for all attachments (no macros, no Flash etc permitted to run). If the user wants something to run, they can explicitly grant execute rights in the very few cases where it should be required.

    And 2 months to fix something that is actively being exploited? That, frankly, is pathetic and that is why people should not be using Flash or Adobe need to release the code to the community. You can bet that the legion of geeks with too much time on their hands would have a patch ready in a few days (or sooner).

    Oh, and they might be able to get Flash to be slightly less shit.

    1. Ross 7

      Re: *nix

      Umm, it doesn't affect *nix because the shell code is designed for a Win environ ^^

      As to rights - the exact same issue exists in *nix. The Word doc does not have execute rights - it's data! However the shell executes winword.exe when you open the Word doc. The problem is that data can end up being treated as code (in the Flash player though, not in Word).

      It's not even that simple to fix thanks to the abomination that is C++. You can mark pages as code or data and intentionally break 1000s of apps to make people fix the problem, however as pointers are stored in data, there is still the possibility of munging a pointer after some jiggery-pokery (a la ASLR by-passing) and still ending up with arbitary code execution.

      It'd be *much* more difficult, but to say it would be impossible is foolish.

      The patch time is pretty poor, but this isn't the usual case of "Bob quietly lets Adobe know of a 0-day in Feb. In May Adobe release a patch and tell everyone about it, crediting Bob with the discovery". Adobe have no head start, so their 2-3 month patch process unfortunately starts after the exploit is being actively used in the wild, which makes it all the more noticable.

      There's clearly a reason it takes 2-3 months. It could be that they are sitting on their ****es, or, they might have a few million lines of code to check to make sure they don't introduce any additional "features" in the new patch (they save that for the "bells and whistles" team).

      I'm no Adobe apologist (their stuff is awful both in terms of usability and security) but to be surprised that :

      #1 there are lots of exploits in an extremely large and complex code base that is not publicly scrutinised; and

      #2 it should take so long to create and test a patch for that code base

      is crazy.

  11. Anonymous Coward
    Boffin

    solution ..

    Set the Word Viewer as the default document viewer, make normal.dot or Normal.dotm readonly ...

    http://www.microsoft.com/downloads/en/details.aspx?FamilyID=3657ce88-7cfa-457a-9aec-f4f827f20cac&displaylang=en

  12. heyrick Silver badge

    Fix Flash? Fix Word?

    No. Fix Thunderbird, Outlook, etc. Easy rule, if you aren't in my address book, your attachment is deleted (it will linger in trash for a couple of days in case you really wanted it). The time has come when we should stop blindly accepting content from unknown sources...

    1. Tom 13

      No, Word and Flash are the correct places to fix it.

      If I'm dealing with a vendor I'm not likely to have their name in my address book, and I'm likely to want whatever document is attached. The problem is hooking the applications directly to the kernel of the OS, which is a MS SOP from their start. It should have been done away with when they released 95. They claimed they were killing it when the released NT. Then they claimed it again when they released Vista. Somehow I doubt they have.

  13. Anteaus
    Gates Horns

    "Rich user experience" to blame.

    MS are so keen on this cliche - along with "Tight integration" but somehow can't see that it's at the root of most PC security problems. They're not called Trojan Horses for 'nowt, and every time MS invents another risky file-embedding technology, they create another opportunity for something nasty to get onto your computer by a totally-unexpected route.

  14. mark l 2 Silver badge

    Openofffice

    Is there still a risk if you open the word file in OpenOffice, does Openoffice execute flash content emedded in MS files?

This topic is closed for new posts.

Other stories you might like