When prompted to install updates for your Adobe products, please do so… A number of patches are available that will address multiple vulnerabilities.
This comes from our friend and partner, WatchGuard’s blog (follow the links through for Adobe’s official explanation):
Adobe Patch Day: Shockwave, Flash Professional, Photoshop, and Illustrator Updates
Severity: High
Summary:
- These vulnerabilities affect: Adobe Shockwave Player, Flash Professional, Photoshop, and Illustrator
- How an attacker exploits them: Multiple vectors of attack, including enticing your users to open malicious files or visit specially crafted web sites
- Impact: Various results; in the worst case, an attacker can gain complete control of your computer
- What to do: Install the appropriate Adobe patches immediately, or let Adobe’s updater do it for you.
Exposure:
Today, Adobe released four security bulletins describing vulnerabilities in many of their popular software packages, including Shockwave Player, Flash Professional, Photoshop, and Illustrator. A remote attacker could exploit the worst of these flaws to gain complete control of your computer. The summary below details some of the vulnerabilities in these popular software packages.
- APSB12-13: Five Shockwave Code Execution Vulnerabilities
Adobe Shockwave Player displays interactive, animated web content and movies called Shockwave. According to Adobe, the Shockwave Player is installed on some 450 million PCs.
Adobe’s bulletin warns of five security vulnerabilities that affect Shockwave Player 11.6.4.634 and earlier for Windows and Macintosh. Adobe’s bulletin doesn’t describe the flaws in technical detail, only characterizing them as memory corruption vulnerabilities. All five flaws share the same impact. If an attacker can entice one of your users into visiting a website containing some sort of malicious Shockwave content, he could exploit these vulnerabilities to execute code on that user’s computer, with that user’s privileges. If your Windows users have local administrator privileges, an attacker could exploit this flaw to gain full control of their PC.
Adobe Priority Rating: 2 (Patch within 30 days)
- APSB12-12: Flash Professional Buffer Overflow Vulnerability
Adobe Flash is a platform for creating interactive or animated web content and video. Flash Professional is the Adobe authoring environment used to create Flash content.
Flash Professional 11.5.1.348 and earlier for Windows and Mac suffers from a buffer overflow vulnerability. Adobe does not share any relevant detail about this flaw, nor how an attacker might exploit it. However, we assume that if you open specially crafted Flash content in Flash Professional, an attacker can leverage this flaw to execute code on your computer, with your privileges. As usual, if you have administrative or root privileges, the attacker would gain complete control of your machine.
Adobe Priority Rating: 3 (Patch at your discretion)
- APSB12-11: Photoshop TIFF Handling Vulnerability
Photoshop is a popular image editing program. Photoshop CS5.5 (for Windows and Mac) suffers from two vulnerabilities; a vulnerability involving its inability to properly handle specially crafted TIFF images, and an unspecified buffer overflow vulnerability. By tricking you into downloading and opening a malicious image in Photoshop, an attacker can exploit the TIFF flaw to execute code on your machine, with your privileges. If you have local admin privileges, the attacker gains complete control of your computer. Adobe doesn’t describe how an attacker might leverage the second buffer overflow vulnerability.
Adobe Priority Rating: 3 (Patch at your discretion)
- APSB12-10: Five Illustrator Code Execution Vulnerabilities
Illustrator is Adobe’s vector drawing software. It suffers from five unspecified memory corruption vulnerabilities. Adobe doesn’t describe these flaws in any other detail, other than calling them code execution vulnerabilities. If forced to guess, we assume that if you handle specially crafted, Illustrator-compatible files (perhaps an image), an attacker could exploit this flaw to execute code on your computer with your privileges. Again, if you are an administrator, the attacker gains full control.
Adobe Priority Rating: 3 (Patch at your discretion)
While we’re on Adobe updates, if you haven’t installed the early Flash Player update that Adobe released last week, we recommend you do so immediately. That update is much more severe than the ones released today.
Solution Path:
Adobe has released updates for all their affected software. If you use any of the software below, we recommend you download and deploy the corresponding updates as soon as possible, or let Adobe’s automatic updater do it for you.
NOTE: Adobe has chosen to only release some of these fixes as paid updates (CS6). If you didn’t already plan to pay for these updates, you will have to decide if these security issues change your mind. On a positive note, attackers don’t often target the products in question (Photoshop, Illustrator, Flash Professional). Nonetheless, it’s difficult for us not to recommend the latest security updates, and we wish that Adobe had extended these security updates to previous versions as well.
- APSB12-13: Upgrade to Shockwave 11.6.5.635
- APSB12-12: Your only recourse is upgrading to Flash Professional CS6, which is a paid update.
- APSB12-11: Your only recourse is upgrading to Photoshop CS6, which is a paid update.
- APSB12-10: Your only recourse is upgrading to Illustrator CS6, which is a paid update.
For All WatchGuard Users:
Attackers can exploit these flaws using diverse exploitation methods. A properly configured UTM device may mitigate the risk of some of these issues. That said, it cannot protect you from local attacks, nor can it prevent attacks that leverage normal HTTP traffic. Therefore, installing Adobe’s updates is your most secure course of action.
Status:
Adobe has released patches correcting these issues.
References:
- Adobe Security Update APSB12-10
- Adobe Security Update APSB12-11
- Adobe Security Update APSB12-12
- Adobe Security Update APSB12-13
This alert was researched and written by Corey Nachreiner, CISSP.
Corey Nachreiner | May 8, 2012 at 4:35 pm | Tags: adobe, Flash Player, patch, Photoshop, shockwave, updates | Categories: Security Updates | URL: http://wp.me/pVP8E-xd
—
Should you require assistance with these Adobe security updates or any security or network updates for your business here in the Greenville / Upstate area, please do not hesitate to call upon us at 864.990.4748 or use our handy CONTACT form!