Followup to Flash/swf stories
We've received quite a bit of mail about our stories yesterday about the malicious SWF files attempting to exploit older versions of the Adobe Flash player. So, here are a few of the things that have come out of our discussions.
- Our friends over at shadowserver.org (thanx, Steven) have a nice writeup that includes a bunch of domains they've noted that have the malicious SWF files.
- If you aren't sure which version of the flash player you are using, Adobe provides this page where you can check for yourself.
- On closer examination, this does not appear to be a "0-day exploit". Symantec has updated their threatcon info, as well. We have yet to see one of these that succeeds against the current version (9.0.124.0), if you find one that does, please let us know via the contact page.
- It appears that this exploit may be included in the Chinese version of the MPack exploit toolkit (among others).
- In case we weren't clear about it earlier, it appears that the infected web sites check which browser you are using in addition to the flash player version to determine which exploit to deliver.
There are several ways to protect yourself even if you have a vulnerable version of the Flash player.
- In Firefox, you can use either of the following add-ons, NoScript (one of our favorites, found here or here) or FlashBlock (here or here).
- In IE, see here for how to set the "killbit", the CLSID is BD96C556-65A3-11D0-983A-00C04FC29E36.
Update: (2008-05-28-16:54UTC) I was remiss in not mentioning Dancho Danchev's writeup.
My next class:
LINUX Incident Response and Threat Hunting | Online | US Eastern | Jan 29th - Feb 3rd 2025 |
×
Diary Archives
Comments
Andrew from Vancouver
May 28th 2008
1 decade ago