Security Alert: 0-Day Attack In-The-Wild for Adobe Flash, Reader, and Acrobat

Adobe Flash Player, Reader and Acrobat are prone to a remote-code-execution vulnerability (C.V.E.-2010-1297). Successful exploitation may allow an attacker to take control of the system in the context of the user running the application.

Adobe reported that the issue is being actively exploited in the wild against all vulnerable applications. Patches are currently not available.

The vulnerability affects the following:

  • Adobe Flash Player 10.0.45.2, 9.0.262, and earlier 10.0.x and 9.0.x versions for Windows, Macintosh, Linux and Solaris
  • Adobe Reader and Acrobat 9.3.2 and earlier 9.x versions for Windows, Macintosh and UNIX.

An attacker can exploit the issue by enticing a user to visit a malicious Web Site embedding an S.W.F. file or open a specially-crafted P.D.F. file with S.W.F. content.

Users are advised to:

  • Filter S.W.F. and P.D.F. Files at e-mail Gateways until a Fix is available.
  • Ensure that Anti-Virus and I.D.S. Definitions are up-to-date.
  • Avoid opening files from Un-Trusted sources.
  • Avoid following Links provided by Un-Known or Un-Trusted sources.
  • Run all software as a non-privileged User with Minimal Access Rights.
  • Deploy N.I.D.S. to monitor Network Traffic.
  • Deploy memory-protection schemes.

 

More information is available at the following locations:

Adobe Flash Player, Acrobat Reader, and Acrobat "authplay.dll" Remote Code Execution Vulnerability:
http://www.securityfocus.com/bid/40586.

Security Advisory for Flash Player, Adobe Reader and Acrobat:
http://www.adobe.com/support/security/advisories/apsa10-01.html.