Tagged: Flash Toggle Comment Threads | Keyboard Shortcuts

  • jkabtech 12:17 pm on December 15, 2017 Permalink |
    Tags: , , Flash, rushes   

    Adobe rushes out fix for exploited Flash bug 

    After Kaspersky discovers hackers using flaw to deploy FinFisher. Adobe has issued an emergency patch for its Flash software after discovering hackers are actively exploiting the newly-discovered bug in the wild.The patch came after Kaspersky Lab said a group it was tracking, BlackOasis, used the previously unknown weakness on October 10 to plant Fin…

    Hi! You’ve reached one of our premium articles. This is available exclusively to subscribers.

    It’s free to register, and only takes a few minutes.

    Once you sign up you’ll have unlimited access to the full catalogue of Australia’s best business IT content, as well as a daily news bulletin delivered straight to your inbox.

    Register now Already have an account? Log in to read this article.

    View the Original article

  • jkabtech 4:17 am on October 18, 2017 Permalink |
    Tags: , , Flash, Wikipedia   

    How To Download All of Wikipedia Onto a USB Flash Drive 

    Image: Pexels

    Wikipedia might not always be the most accurate source of information out there, but it is one of those things that I’m constantly thankful is around. You can actually ensure that the site is always there for you, even when you don’t have a web connection, by downloading it in its entirety.

    We wrote about a way to do this with an open-source app called XOWA last year, but the process is actually even easier.


    Wikipedia creates a download of its database on a regular basis that is literally just sitting there for you to download it. The site file is available to anyone who wants it, and it can be used for

    View the Original article

  • jkabtech 8:17 pm on October 2, 2017 Permalink |
    Tags: creds, Flash, , , , Recently, sandbox,   

    Recently patched Flash Player sandbox leaks Windows creds 

    Old problem comes back to haunt Adobe.

    A recently patched vulnerability in Adobe’s Flash Player could be used to steal Windows user credentials, Dutch security researcher Björn Ruytenberg has discovered.

    The bug is a variant of an old vulnerability, CVE-2016-4271, which Adobe patched in September 2016.

    That flaw could enable hackers to fool users into loading a Flash file that would connect to a remote SMB server and steal Windows credentials.

    Adobe added new security measures in Flash Player version 23, but they can be bypassed, Ruytenberg found.

    In a blog post, Ruytenberg said a hacker could override Flash making outbound connections to web links with Windows uniform naming convention file-like path names by loading a Flash file that makes requests to a remote server via HTTP or HTTPS.

    “By setting the HTTP location header and an appropriate response code (eg 301, 302), this vulnerability can be used to redirect HTTP requests to a malicious SMB server,” he said.

    In an example, the researcher described a scenario where a malicious Flash application as well as SMB server are hosted on a machine having the same IP address.

    This Flash application runs on the victim’s local machine in the remote sandbox. That is, the runtime prohibits local file system access but allows remote connections.

    “Tracing back to the Win32 API, the functions affected by redirect-to-SMB reside in urlmon.dll. Hence, Internet Explorer and any third-party applications using them are vulnerable,” he said.

    He said Adobe’s cross-domain policy file, which dictates when a Flash client is allowed to load resources from a different domain other than the originating one, could be abused.

    “The careful reader might notice that Adobe’s definition, unlike HTTP CORS (referencing RFC6454), restricts itself to cross-domain data handling. More specifically, it does not take into account differing protocols,” he said.

    “This security mechanism should therefore be unrelated to our blocked attack: we are trying to redirect to SMB, a different protocol, on the same host.”

    Ruytenberg said crossdomain.xml is being requested from the same host that serves the Flash application. By constructing a least-restrictive cross-domain policy, the researcher was able to establish an SMB connection from the victim’s machine to a remote server.

    From there a Python script called SMBTrap operates as a malicious SMB server, and captures any incoming requests along with the victim’s user credentials.

    Firefox as well as Internet Explorer are vulnerable to this kind of attack while Edge and Chrome aren’t, he said. This also applies to all current versions of Microsoft Office. In addition, the flaw affects both remote and local-with-networking sandboxes.

    Ruytenberg said having introduced new input validation measures, Flash Player 23 minimises potential attack vectors by rejecting any outbound requests for non-HTTP URLs.

    “Quite unexpectedly, however, input validation is only done once: while the initial HTTP request is validated, consecutive redirects are not. Combined with the fact Flash is still susceptible to a known Windows vulnerability therefore effectively kills a seemingly solid approach,” he said.

    “This is unfortunate, and perhaps once again illustrates the underlying problem that platform-specific vulnerabilities need to be taken into account whenever possible.”

    The issue is fixed in Flash Player

    Copyright © SC Magazine, UK edition Tags:adobe bj246rn ruytenberg flash player security windows By Rene Millman
    Staff Writers
    Aug 14 2017
    8:15AM Security is
    powered by

    View the Original article

  • jkabtech 12:17 pm on August 15, 2017 Permalink |
    Tags: Flash, Petition,   

    Petition to open source Flash 

    12 commits 1 branch 0 releases 2 contributors Clone or download Clone with HTTPS Use Git or checkout with SVN using the web URL.

    Download ZIP Find file Branch: master Switch branches/tags Branches Tags master Nothing to show Nothing to show New pull request Latest commit 6c2c1b4 Jul 26, 2017

    View the Original article

    • Benita Moss 7:57 pm on January 21, 2018 Permalink | Log in to Reply

      I appreciate, result in I discovered exactly what I was looking for. You have ended my four day lengthy hunt! God Bless you man. Have a nice day. Bye


  • jkabtech 4:41 am on January 18, 2016 Permalink |
    Tags: , Community, Enhances, Flash   

    Community Collaboration Enhances Flash 

    With the December release of Flash Player, we introduced several new security enhancements. Just like the Flash Player mitigations we shipped earlier this year, many of these projects were the result of collaboration with the security community and our partners.

    Adobe has spent the year working with Google and Microsoft on proactive mitigations. Some of the mitigations were minor tweaks to the environment: such as Google’s Project Zero helping us to add more heap randomization on Windows 7 or working with the Chrome team to tweak our use of the Pepper API for better sandboxing. There have also been a few larger scale collaborations.

    For larger scale mitigations we tend to take a phased, iterative release approach. One of the advantages of this approach is that we can collect feedback to improve the design throughout implementation. Another advantage is that moving targets can increase the complexity of exploit development for attackers who depend on static environments for exploit reliability.

    One example of a larger scale collaboration is our heap isolation work. This project initially started with a Project Zero code contribution to help isolate vectors. Based on the results of that release and discussions with the Microsoft research team, Adobe then expanded that code to cover ByteArrays. In last week’s release, Adobe deployed a rewrite of our memory manager to create the foundation for widespread heap isolation which we will build on, going forward. This change will limit the ability for attackers to effectively leverage use-after-free vulnerabilities for exploitation.

    Another example of a larger scale mitigation this year was – with the assistance of Microsoft – our early adoption of Microsoft’s new Control Flow Guard (CFG) protection. Our first roll out of this mitigation was in late 2014 to help protect static code within Flash Player. In the first half of this year, we expanded our CFG usage to protect dynamic code generated by our Just-In-Time (JIT) compiler. In addition, Microsoft also worked with us to ensure that we could take advantage of the latest security controls for their new Edge browser.

    Throughout 2015, vulnerability disclosure programs and the security community have been immensely helpful in identifying CVE’s. Approximately one-third of our reports this year were via Project Zero alone. Many of these were non-trivial as many of the reported bugs required significant manual research into the platform. With the help of the security community and partners like Microsoft and Google, Adobe has been able to introduce important new exploit mitigations into Flash Player and we are excited about what we are queuing up for next year’s improvements. Thank you to everyone who has contributed along the way.

    Peleus Uhley
    Principal Scientist

    View the original article here

Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc
%d bloggers like this: