Adobe To Patch Flash 0-Day Friday 113
Trailrunner7 writes "Adobe is planning to patch the recently disclosed Flash Player vulnerability on Friday — just four days after it was disclosed — for users on Windows, Mac OS X and Linux. The vulnerability is being used in targeted attacks right now that use malicious Word documents. Adobe said it plans to push out the Flash Player patch for Google Chrome today, as part of the Chrome release channel, but Reader X users will have to wait till June for a fix."
They're planning to patch a 0-day? (Score:3)
Re: (Score:2)
Re: (Score:1)
In /., you're supposed to give a car analogy, not a statesman, nor a politician.
Let's see.. if a car can't work even while its mileage is still zero, you call it, uh... what?
That shows how little I know of cars.
Re: (Score:2)
No, it refers to a crack released on or before the day the game it targets is released. Script kiddies only use the term because they think warez d00ds are the coolest.
Re:They're planning to patch a 0-day? (Score:5, Interesting)
Re: (Score:1)
Re: (Score:1)
Re: (Score:3)
No, zero-day means that the developer didn't know about it when the attack went live. They'll eventually discover the vulnerability and patch it, but that doesn't change the fact that it was a zero-day attack.
Re: (Score:2)
Zero-day vulnerability = vulnerability the developer doesn't know about.
Please read the summary again and realize which one we are talking about here.
Re: (Score:2)
It doesn't change the fact that it was a zero-day vulnerability, either.
And Adobe themselves called it one:
During our response to any zero-day vulnerability, Adobe seeks to protect as many users as quickly as possible. As part of our collaboration with Google, Google receives updated builds of Flash Player for integration and testing. Once testing is completed for Google Chrome, the release is pushed via the Chrome auto-update mechanism. Adobe is testing the fix across all supported configurations of Windows, Macintosh, Linux, Solaris and Android (more than 60 platforms/configurations altogether) to ensure the fix works across all supported configurations. Typically, this process takes slightly longer and, in this case, is expected to complete on April 15 for Flash Player for Windows, Macintosh, Linux and Solaris
Re: (Score:2)
We know what a 0-day vulnerability is. Whether Adobe uses the term correctly or not is irrelevant to the discussion.
Re:They're planning to patch a 0-day? (Score:4, Insightful)
It was a zero-day vulnerability. The fact that it's no longer a zero-day vulnerability isn't nearly as important as the fact that it was one, since the very fact that we're discussing it means that it's no longer unknown.
If you want to be that pedantic, you might as well just throw out the term altogether, because as soon as you find out that a 0-day exists, it ceases to exist.
Re: (Score:2)
as soon as you find out that a 0-day exists, it ceases to exist.
The 0day that can be named is not the true 0day.
What is the sound of one buffer overflowing?
Re: (Score:2)
No, the Heisenphrase is still quite useful, but just like "undiscovered species" it has to be qualified with a word like "previously" when talking about a specific occurrence, and not used in statistics, forecasts and speculations.
Re: (Score:2)
Why does it need to be qualified with a word that's redundant given the context?
Re: (Score:2)
Would you call a new species that was discovered last week a "previously undiscovered species", or insist on "undiscovered species" because "previously" was redundant given the context?
Re: (Score:2)
If you're talking about its discovery, it's redundant to say that it was previously undiscovered.
Re: (Score:2)
I understand that perfectly well. It means that it is unknown to the vendor. I was stating it from the point of view of the vendor of the product.
Re: (Score:2)
The attack was a zero day attack, Adobe didn't know the vulnerability existed until the attack was discovered. They are now patching said attack on day 4. Saying that Adobe is patching a zero day attack 4 days after it was discovered doesn't seem unreasonable to me.
Re: (Score:2)
Re: (Score:2)
Yes, Adobe will patch a vulnerability that was used in a 0-day attack. Or "Adobe To Patch Flash 0-day" for short.
I suppose when I ask if you know what time it is you'll say "Yes", then give me a lecture on how my question was improperly phrased if I'm not satisfied with your answer.
Re: (Score:2)
Re: (Score:2)
So it is actually a "minus four day" attack?
Re: (Score:2)
This may be one of the few times 0 day was actually used right.
Actually, no. It's a prime example of it being used wrong, as crisis maximization.
Zero day is a vulnerability before you discover it.
First-day is when you immediately put out a fix.
4 days after discovery, like this is, is three days after that and has nothing whatsoever to do with zeroth-day exploits.
And in "just" four days? (Score:2)
I miss reading a Slashdot article about a 0-day (within hours of the actual vulnerability), then going to patch it and discover I'd already patched via my distro's repository.
Re: (Score:1)
My distro already has this one patched. It simply doesn't install it
Re: (Score:2)
Via Word ... (Score:2)
Re: (Score:3)
HOW MANY MORE TIMES?
Do NOT open a document that you're not expecting, that isn't from someone you know, etc. Yeah, you could say that this can be passed legitimately from person to person but come on - this is the first rule of virus protection - don't open documents without screening them (not via some magical software that "knows" if it's bad or not, but by using your brain) first.
The fact that you can even still GET a Word virus whether it executes in macros, integrated Flash or some other ActiveX-based
Re: (Score:2)
What happens when you receive a document meant to produce a browser exploit when rendered by a web-based office application?
Hey, it could happen.
Reminds me of a virus from the novel Jennifer Government. A popular antivirus suite would gather info on any files it picked up with a heuristic scan and send that info to the server, which would then distribute virus definition updates to all the clients. The virus was meant only to be picked up by the heuristic scan, but it was made so that the resulting virus in
Re: (Score:3)
Why should I?
It's a fucking document. It's a series of bits which are converted into pixel values and shown on a screen, not code.
If you get your computer compromised by a document, then the only person who's fault it is is the one who wrote the document decoder (and/or the idiot who decided that documents should include embedded code, which is ridiculous).
You have your computer configured right now to accept documents that you're not expecting -- jpegs, all over the web. But you do this all the time, becau
Re: (Score:2)
But you do this all the time, because you know that the folks who wrote your browser managed to not fuck up a jpeg decoder -- no matter what's in that file, the worst it can make you do is get in trouble with your boss.
I can think of at least one way a JPEG can get you in bigger trouble than that. >_>
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
A million times this.
What bugs me is that all the programmers who wrote these format decoders riddled with buffer overruns still have jobs. How can that be possible? Either they knew at the time that they were writing unsafe virus-holes - and went ahead anyway, thus committing gross negligence - or else, even worse, they had no way of telling if the code they were writing was safe or unsafe and yet went ahead and released it on a "who knows, what's the worst that could happen?" sort of policy.
Either way, it
Re: (Score:2)
Re: (Score:2)
"Microsoft just don't care any more."
I did not think Microsoft ever cared about anything other than Microsoft's profits.
Re: (Score:2)
This one comes in via Word. MS released a security update this week that installs an Office add-in that scans 2003, 2007 & 2010 Office docs for malicious code. Hopefully MS's efforts will prevent the next Adobe security hole.
I've always assumed Word Processor was not the same as Compiler or Interpreter. Shows just what a marvelous world it is when your Word documents aren't even documents at all, but full environments of their own.
Generally THIS is why I don't use Word at home - I use a Word Processor which is a Word Processor and nothing more.
Re: (Score:1)
Re: (Score:2)
Generally THIS is why I don't use Word at home - I use a Word Processor which is a Word Processor and nothing more.
Emacs users all of the world spit in scorn at your shameful statement.
Re: (Score:2)
Unsophisticated people use hundred-megabyte software packages to prepare documents.
Sophisticated people use vim and latex.
Re: (Score:2)
I've been modded down to troll for asking these kinds of questions before. I'm really just curious, I ask with all humility, grace, and supplication...
Re: (Score:2)
Does it come in via word, or via a word document? i.e. if I opened up a malicious .doc/.docx in Open Ofice, would I be affected?.
From Adobe's security bulletin: [adobe.com]
There are reports that this vulnerability is being exploited in the wild in targeted attacks via a malicious Web page or a Flash (.swf) file embedded in a Microsoft Word (.doc) file delivered as an email attachment, targeting the Windows platform.
I don't know if OO will try to use the .swf payload inside the Word document.
Re: (Score:2)
I continue to be stunned by the fact that Word will attempt to launch an embedded Flash object ... I'm completely baffled by the fact that you can put a .swf file at all. Why the hell would you need that?
It's no wonder we get so many *(&$^& viruses when word-processors attempt to launch embedded executable files without asking or anything.
To me that sounds like the security equivalent of picking up used syringes off the ground and sticking them into your arm to see what's in them.
I mean, WTF? Does
Re: (Score:2)
I continue to be stunned by the fact that Word will attempt to launch an embedded Flash object ... I'm completely baffled by the fact that you can put a .swf file at all. Why the hell would you need that?
And what happens if you print that?
Do you get a Youtube movie at 60 pages per second coming out of your laser printer?
Re: (Score:1)
I am not a hacker in this area but the word .doc format is specifically designed as an executable. The reason why is to make it harder for people to leave the MS ecosystem and switch to competing products. Also it is there to give Visual Basic an edge.
Virus makers love this as their code can hide in a perfect container. OpenXML which is now used is far superior because nothing is hidden but it also supports legacy binary blobs of executable code.
Keep polishing that turd Adobe (Score:3, Funny)
At least my iPad is still safe.
Re: (Score:2)
Re: (Score:2)
You mean like a golden cage is still "safe" from some food that happens to be a turd? :P æbut also from all other food.
I'm not sure what you meant by that but thanks for reminding me to check my iPhone for an Angry Birds update.
Re: (Score:3, Informative)
Not necessarily. Even without Flash support, those things are huge vectors for earworms.
7 am, waking up in the morning
Zero-day fresh, gotta get my warez,
Gotta sign my key, gotta have serials
Crackin' everything, the time is goin'
Tickin' on and on, everybody's codin'
Gotta log on to the Slash - dot
Gotta slash my dot, I click Refresh...
PDF for printouts,
Flash is for online,
Gotta make my mind up,
Which code did they break?
It's Friday, Friday
Zero-day on Friday,
Sysad
Re: (Score:2)
Just as a Power Wheels truck is safe from a high-speed crash.
Re: (Score:1)
Linux? (Score:1)
Re:Linux? (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
Personally, I've had such ongoing, persistent library and software problems since I switched to 64-bit in 2006, that at this point I just want to go back to 32 bit. Just last week I had to spend 4 hours fixing a 32-bit library bug. Flash has of course been the single biggest and most obnoxious problem with my still ongoing 64-bit upgrade process.
Re: (Score:2)
Personally, I've had such ongoing, persistent library and software problems since I switched to 64-bit in 2006, that at this point I just want to go back to 32 bit.
Meanwhile every computer I own that has a 64-bit CPU runs 64-bit Linux and I've never seen any issue with the 64-bitness other than Adobe's inability to ship a working 64-bit Flash plugin.
Re: (Score:2)
I don't even have problems with Adobe's 64-bit Flash plugin. What can I say, it just works.
Article is Dup (Score:5, Funny)
Doesn't Slashdot post this same article every week?
Re: (Score:1)
40..50 years of computing (Score:2)
And the whole damn country can be taken down by a media player. Truly fascinating.
Re: (Score:2, Funny)
Unless you're on an iPad
Re: (Score:1)
Keyloggers
Re: (Score:2)
Keyloggers
No keyboard! (Well, none to speak of, anyway).
Re: (Score:1)
Re: (Score:2)
Yeah for those we use other browser exploits, like the old jailbreakme.com, or the HTML-based forced-dialing vulnerability.
Re: (Score:2)
I used to think that William Gibson's Neuromancer was wildly unrealistic for portraying a future Net so riddled with vulnerabilities that any cowboy kid with a cyberspace console could hack their way into a bank and escape barely milliseconds ahead of the Intrusion Countermeasure Electronics.
Now I know that the unrealistic part is that there's any countermeasures at all.
US grammar? (Score:1)
They are planning to patch Friday?
Why does Friday need patching?
Re: (Score:2)
Re: (Score:2)
Because of this http://www.youtube.com/watch?v=CD2LRROpph0 [youtube.com]
Summary not quite accurate... (Score:4, Informative)
Re: (Score:1)
All of these exploits in Adobe products is why everyone is coming out with their own PDF viewers or sandboxing the hell out of Adobe Flash.
Google Chrome has it right, wrap Adobe Flash in the same nearly impenetrable sandbox that the browser itself is wrapped in. The Google Chrome sandbox has proven time and time again that no matter what exploit is found in the browser, the sandbox has rendered them co
Re: (Score:2)
Smells astroturfy, because you're making sure to call it "Google Chrome" every time instead of just "Chrome" like a normal slashdotter would.
For those that actually deploy this (Score:1)
0 day ... what it means. (Score:2)
Its funny to see everyone arguing over what zero day means ...
Back in my day, and yes, I'm an old geezer apparently, zero day meant ... the first day it was discovered.
zero day warez releases were released the same day as the software hit the shelves or went on sale somewhere.
The next day, it was no longer zero day, it would be 1 day.
You also had pre-release warez of course, for things that were available on ftp sites or IRC before the public release, also commonly called zero day warez as well.
You wouldn't
Re: (Score:2)
Re: (Score:3)
Flash O'Day (Score:2)
Wasn't he a quarterback for the Irish?
4 days sounds fairly quick (Score:1)
Leave Flash behind (Score:3)
Try to uninstall Adobe Flash for a week. I did and I can't say that I miss anything.
YouTube:
- The HTML5 beta [youtube.com] works rather well with modern browsers like Firefox 4.0 and nearly every video is available. You don't need a Google account. The setting is stored in a cookie.
- If you're on Linux, try Minitube [gawker.com]. It's a standalone player for YouTube that uses hardware acceleration.
Thanks to the iPad, more and more web sites offer alternatives to Flash. My preferred news TV station is now streaming both with Ogg/Theora and H.264.
Yes, I can't view the occasional funny cat video because it's only available in Flash format but guess what: I'm still alive.
Re: (Score:2)
Really? Which news site streams OT?
Re: (Score:2)
It's a German news program: tagesschau.de
Screenshot [imgur.com].
They got an award for it too:
"The Free Software Foundation Europe (FSFE) and the Foundation for a Free Information Infrastructure (FFII) have used the occasion of Document Freedom Day 2011 to give an award to German broadcaster ARD's internet platform tagesschau.de for offering broadcast shows in the free Ogg Theora video format. According to the FSFE announcement, the technical manager and vice editorial director will be presented with cakes at separate e
Re: (Score:1)
According to the FSFE announcement, the technical manager and vice editorial director will be presented with cakes at separate events in Hamburg and Berlin."
It's a trap! The cake is a lie!
OK Chrome has the fix already! (Score:2)
Just as bad as Microsoft (Score:1)
That explains the my friend's recent infection. (Score:1)
Here's the summary of the conversation:
Him: dude, it's happened again.
Me: too much porn man.
Him: I didn't do anything, even used Chrome and Firefox
Me: which site did you go to?
Him: it's my office computer, I can't look at porn here.
Me: OK, maybe there's not enough porn on your computer.
no patch yet... (Score:2)