We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Adobe to patch two-year-old Shockwave vulnerability in February 2013

Adobe to patch two-year-old Shockwave vulnerability in February 2013

Flaws could allow remote code to be executed, one of the most severe kinds of vulnerabilities

Article comments

Adobe plans to close a dangerous hole in its Shockwave application in February that causes the application to be downgraded when a user launches older multimedia content, allowing hackers to target years-old vulnerabilities.

The US Computer Emergency Readiness Team (US CERT) issued an advisory on the vulnerability, which could allow an attacker to deliver malware and execute arbitrary code, considered to be one of the most dangerous kinds of flaws.

US CERT notified Adobe of the problem on October 27, 2010, but an Adobe spokesperson said yesterday that the problem will be closed with the next major upgrade of Shockwave, scheduled for February 12.

"We are not aware of any active exploits or attacks in the wild using this particular technique," said Wiebke Lips, senior manager with Adobe corporate communications. Adobe did not consider the issue a high risk to users.

Shockwave is used to play content created in Macromedia and Adobe Director, which offers advanced tools for creating interactive content, including Flash.

US CERT cited Adobe documentation that says if a user encounters content that does not specify to use the latest Shockwave version 11, an older ActiveX control is downloaded that pulls components of the older Shockwave 10 player. Shockwave uses an ActiveX control when content is requested within Microsoft's Internet Explorer and is present as a plugin in other browsers, according to US CERT.

The Shockwave 10 runtime contains vulnerabilities as well as the application's "Xtras," which are components of content. The downgrading of Shockwave to an older version also opens up Adobe's Flash multimedia application for attack, the agency said.

"Because of this design, attackers can simply target vulnerabilities in the Shockwave 10 runtime, or any of the Xtras provided by Shockwave 10," US CERT said. "For example, the legacy version of Shockwave provides Flash 8.0.34.0, which was released on November 14, 2006 and contains multiple, known vulnerabilities."

US CERT has published two other document describing the issues with Xtras and Flash, which Adobe said it is analysing. The first concerns Shockwave's downgrading to an older Flash version, which affects both Windows and Apple's Mac. The second involves the problem of malicious Xtras.

"We are not aware of any active exploits or attacks in the wild using these techniques either," Lips said.

Share:

Comments

Advertisement
Send to a friend

Email this article to a friend or colleague:


PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.


ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open
* *