Adobe issues update to fix Flash flaws

Share this article:
Adobe on Wednesday released a new version of its Flash player to correct seven vulnerabilities that could permit attackers to take remote control of a victim's computer.

Systems running Flash version 9.0.115.0 and earlier, and those running version 8.0.39.0 and earlier, are vulnerable, according to a US-CERT alert. Attackers can exploit the flaws by tricking unsuspecting users into visiting a website hosting a specially crafted SWF (Shockwave Flash) file.

If successful, the resulting payload could range from security bypass to cross-site scripting to a complete system takeover, according to vulnerability tracking firm Secunia, which rated the updates highly critical.

As an alternative to upgrading to the latest version, users can disable the Flash plug-in or leverage NoScript, a Firefox add-on.

More information from Adobe is available here.



For more coverage of the RSA Conference, visit our special RSA Conference 2008 microsite. It contains news and announcements from the show floor, as well as podcasts, video and opinion columns from keynote speakers and industry luminaries, like RSA Conference's Sandra Tom La Pedis and Tim Mather, Symantec's John Thompson and Kevin Haley, IBM's Val Rahmani, and SC Magazine's CSO of the Year Dan Lohrmann, CISO of the state of Michigan.

Share this article:

Sign up to our newsletters

More in News

Five schools earn NSA's excellence in cyber ops distinction

The schools earned NSA's Centers for Academic Excellence designation for their cyber offerings.

With RATs at their disposal, 419 scammers target businesses

With RATs at their disposal, 419 scammers target ...

A new report reveals how Nigeria's 419 scammers are spreading malware to pocket business funds.

InfoSec pros worried BYOD ushers in security exploits, survey says

InfoSec pros worried BYOD ushers in security exploits, ...

A study by the Information Security Community on LinkedIn found most organizations don't have proper polices and support for BYOD.