US-CERT Warns Of Flaws In Flash Files And RealPlayer 11 - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Enterprise Applications
News
1/3/2008
03:52 PM
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

US-CERT Warns Of Flaws In Flash Files And RealPlayer 11

A Google security engineer says hundreds of thousands of Flash files are vulnerable and a considerable percentage of major Internet sites are affected.

US-CERT, the U.S Department of Homeland Security's cybersecurity arm, on Wednesday issued two warnings.

The first notice concerns the public availability of exploit code for RealPlayer 11 build 6.0.14.748. US-CERT said it will provide additional information when available.

The second notice concerns a vulnerability in Flash (.swf) files that may allow a remote, unauthenticated attacker to execute a cross-site scripting (XSS) attack on vulnerable systems. The vulnerability has to do with the way that input is validated when passed to an embedded ActionScript and JavaScript in the Flash file.

Flash authoring tools, said US-CERT, may generate Flash files that are vulnerable.

Rich Cannings, a senior information security engineer at Google, has detailed the risks in a Google Docs file. "Simple Google hacking queries reveal that hundreds of thousands of SWFs are vulnerable on the Internet, and a considerable percentage of major Internet sites are affected," he said. "We are only reporting XSS vulnerabilities that have been fixed by the vendors."

Cannings notes that applications that automatically generate .swf files like Adobe Dreamweaver, Adobe Acrobat Connect, InfoSoft FusionCharts, and Techsmith Camtasia were vulnerable but have been fixed. He says other products remain vulnerable and that he will publish details once patches were available.

Cannings calls for Web site owners to serve automatically generated .swf files from numbered IP addresses or other "safe" domains that do not utilize cookies with sensitive information and cannot be used for phishing. He recommends that Flash developers test their SWF content with Stafano Di Paola's SWFIntruder. "If you don't, others will," he says.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Commentary
2021 Outlook: Tackling Cloud Transformation Choices
Joao-Pierre S. Ruth, Senior Writer,  1/4/2021
News
Enterprise IT Leaders Face Two Paths to AI
Jessica Davis, Senior Editor, Enterprise Apps,  12/23/2020
Slideshows
10 IT Trends to Watch for in 2021
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/22/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.
Slideshows
Flash Poll