Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC: Internet Storm Center - Internet Security | DShield Internet Storm Center


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

Critical Vulnerability in Flash Player

Published: 2018-11-21
Last Updated: 2018-11-21 00:39:04 UTC
by Johannes Ullrich (Version: 1)
0 comment(s)

Adobe released a patch for a critical vulnerability in Flash Player [1]. According to Adobe, details about the vulnerability have already been made public. Succesful exploitation does allow arbitrary code execution. Widespread exploitation may be imminent. This is of course, in particular, worrying ahead of the long weekend (in the US) with many IT shops running on a skeleton crew. Try to patch this before you head out on Wednesday, or maybe the weekend shift can take care of it.

Of course, over the weekend you may be asked to look at issues with relative's systems. I recommend that you first apply all patches, including this one, then disable Flash. By first patching, and later disabling, you increase your chances of a patched version being installed once the user decides to re-enable Flash.

Google Chrome and Microsoft's Edge browser also need to be updated. Both include Flash by default and are vulnerable.

The vulnerability was originally described in a blog by Gil Dabah about a week ago as part of the "Insanely Low Level" blog [2].

[1] https://helpx.adobe.com/security/products/flash-player/apsb18-44.html
[2] https://www.ragestorm.net/blogs/?p=421

 

---
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS Technology Institute
Twitter|

Keywords: adobe
0 comment(s)

If you have more information or corrections regarding our diary, please share.

Recent Diaries

VMware Affected by Dell EMC Avamar Vulnerability
Nov 20th 2018
18 hours ago by Xme (0 comments)

Querying DShield from Cortex
Nov 20th 2018
1 day ago by Xme (1 comment)

The Challenge of Managing Your Digital Library
Nov 19th 2018
2 days ago by Xme (1 comment)

Multipurpose PCAP Analysis Tool
Nov 18th 2018
2 days ago by Guy (3 comments)

Quickly Investigating Websites with Lookyloo
Nov 17th 2018
4 days ago by Xme (0 comments)

Basic Obfuscation With Permissive Languages
Nov 16th 2018
5 days ago by Xme (0 comments)

Emotet infection with IcedID banking Trojan
Nov 15th 2018
6 days ago by Brad (0 comments)

Day in the life of a researcher: Finding a wave of Trickbot malspam
Nov 14th 2018
1 week ago by Brad (3 comments)

View All Diaries →

Latest Discussions

CVE Links Are Broken
created Nov 17th 2018
4 days ago by George (1 reply)

Mobile Forensics tools - suggestions?
created Oct 8th 2018
1 month ago by Gary (0 replies)

issues with webpy service
created Oct 1st 2018
1 month ago by Alvaro (0 replies)

Pi Honeypot
created Oct 1st 2018
1 month ago by Alvaro (0 replies)

Attempting to report (msg body missing) -- Powershell malware in zip with jpg
created Sep 10th 2018
2 months ago by W60 (0 replies)

View All Forums →

Latest News

View All News →

Top Diaries

Wide-scale Petya variant ransomware attack noted
Jun 27th 2017
1 year ago by Brad (6 comments)

Using a Raspberry Pi honeypot to contribute data to DShield/ISC
Aug 3rd 2017
1 year ago by Johannes (16 comments)

Detection Lab: Visibility & Introspection for Defenders
Dec 15th 2017
11 months ago by Russ McRee (2 comments)

Maldoc with auto-updated link
Aug 17th 2017
1 year ago by Xme (2 comments)

Second Google Chrome Extension Banker Malware in Two Weeks
Aug 29th 2017
1 year ago by Renato (0 comments)