Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Flash exploits

Ronald Deibert r.deibert at utoronto.ca
Mon Jun 20 12:14:11 PDT 2011


Hi
Members on this list should be aware of a flash exploit is being used on a wide scale, and is affecting many organizations as a drive-by attack on their compromised websites (about which they would probably be unaware).  Some information from the Shadowserver Foundation here http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20110617
and I'm pasting an excerpt below.  We have come across at least one organization affected by this, and will attempt to contact them.

Ron


Friday, 17 June 2011

Flash Exploits on the Loose: Update Now

It is Critical You Update Your Adobe Flash Player


Hopefully you noticed that earlier in the week Adobe issued multiple security updates, which included an update for Adobe Flash Player by way of APSB11-18. What you may not know is that the issue fixed by this update, CVE-2011-2110, is being exploited in the wild on a fairly large scale. In particular this exploit is showing up as a drive-by in several legitimate websites, including those belonging to various NGOs, aerospace companies, a Korean news site, an Indian Government website, and a Taiwanese University. The links are also being used in targeted spear phishing attacks designed to lure particular individuals into clicking the links with hopes of compromising their machines. In case there is any doubt at all, this is very bad. If you run a version of Adobe Flash that is older than 10.3.181.26 (or 10.3.181.24 for Android), then is is absolutely critical that you update your Flash Player.

 

Ronald J. Deibert
Professor of Political Science
Director, The Canada Centre for Global Security Studies and
The Citizen Lab
Munk School of Global Affairs
University of Toronto
r.deibert at utoronto.ca
http://deibert.citizenlab.org/
twitter.com/citizenlab







-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20110620/c43d19e0/attachment.html>


More information about the liberationtech mailing list