"We are reviewing our security update process in order to mitigate risks in Shockwave Player," Edell said. Because of this, it may be easier to exploit a vulnerability when Flash is hosted by Shockwave, for example."Īdobe spokeswoman Heather Edell confirmed that CERT's information is correct, and that the next release of Shockwave Player will include the updated version of Flash Player. In the case of Shockwave, there are some mitigations missing in a number of modules, such as SafeSEH. Though most people have started using Adobe Flash Player and Adobe Air, Shockwave remains the standard support application for animations. "One of the things that helps make a vulnerability more difficult is how many of the exploit mitigations a vendor opts in to. Select Always Activate from the pop-up menu. Check the status that appears to the right of the plug-in name. "So not only are the vulnerabilities there, but they're easier to exploit as well," Dormann said. In the list of Add-ons, look for Shockwave for Director (another name for Shockwave Player). That's because Shockwave has several modules that don't opt in to trivial exploit mitigation techniques built into Microsoft Windows, such as SafeSEH. Dormann said he initially alerted the public to this gaping security hole in 2012 via this advisory, but that he first told Adobe about this lacklustre update process back in 2010.Īs if that weren't bad enough, Dormann said it may actually be easier for attackers to exploit Flash vulnerabilities via Shockwave than it is to exploit them directly against the stand-alone Flash plug-in itself.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |