Adobe advises of Flash flaw exploited via Excel docs

Share this article:

Adobe on Monday warned of a "critical" zero-day vulnerability in Flash Player that attackers currently are exploiting through Microsoft Excel files.

The flaw, which impacts Flash 10.2.152.33 and earlier versions, also impacts Reader and Acrobat because the authplay.dll component, which ships with the popular PDF software, is flawed, according to an Adobe blog post. Reader and Acrobat X 10.0.01 and earlier versions for Windows and Macintosh are affected.

Wendy Poland, a security response program manager at Adobe, said in the post that the company has fielded reports of attackers taking advantage of the vulnerability by embedding a malicious SWF (Flash) file in an XLS (Excel) document, delivered as an email attachment. The company is not aware of any exploits targeting Reader or Acrobat.

A patch is due March 21.

Roel Schouwenberg, senior anti-virus researcher at Kaspersky Lab, said he doesn't think Microsoft and Adobe should allow integration of their two products in this way. But he understands why attackers are taking advantage.

"This kind of structure is a perfect setup for targeted attacks," Schouwenberg wrote in a Monday blog post. "And not surprisingly, targeted attacks have indeed been reported...The reason why the attackers are using Excel as a delivery vehicle is simple. This way the attack can easily be delivered through email. So be extra cautious when you receive XLS files you didn't request."

Share this article:

Sign up to our newsletters

More in News

New backdoor 'Baccamun' spreads through ActiveX exploit

Symantec researchers revealed that the backdoor is dropped after attackers exploit a Windows ActiveX vulnerability.

Outdated browsers put U.K. users at risk of malware

A blog post on Check and Secure website said 70 percent of U.K. users haven't fully updated their internet browsers

Survey: 53 percent change privileged logins quarterly

A Lieberman Software survey highlights the issue or poor password management, even among security pros.