Go Back   Tech Support Forum > Security Center > Computer Security News

User Tag List

Adobe Flash sandbox security busted by researcher

This is a discussion on Adobe Flash sandbox security busted by researcher within the Computer Security News forums, part of the Tech Support Forum category. A security researcher has found a gap in the way Adobe Systems has fortified its Flash Player for better security,


Closed Thread
 
Thread Tools Search this Thread
Old 01-07-2011, 12:04 PM   #1
Security Manager
Analyst
Rangemaster, TSF Academy
 
Glaswegian's Avatar
 
Join Date: Sep 2005
Location: Glasgow
Posts: 39,536
OS: Windows 10 Pro

My System


A security researcher has found a gap in the way Adobe Systems has fortified its Flash Player for better security, which could result in data being stolen and sent to a remote server.

Billy Rios, a researcher who is a security engineer for Google, published on his personal blog a way to get around Flash Player's local-within-filesystem sandbox.

The sandbox allows a Shockwave Flash (SWF) file to read local files but not send data over the network. It also prevents SWF files from making JavaScript calls or HTTP or HTTPS requests, Rios wrote. A local file is described as one that can be referenced using "file: protocol" or a Universal Naming Convention path, Rios wrote.

But Rios found that the sandbox restrictions are actually not quite so strict. He found he could bypass the sandbox but reformatting the request, such as "file://request to a remote server." Adobe, however, limits those requests to local IP (Internet protocol) addresses and hostnames, Rios wrote.

Adobe also blacklists some protocol handlers but not all, a method that Rios considers dangerous. "If we can find a protocol handler that hasn't been blacklisted by Adobe and allows for network communication, we win," Rios wrote.

Flash does not blacklist the "mhtml" protocol handler, which is part of Microsoft's Outlook Express application and installed on Windows systems. So a SWF file could export data by using a command, which Rios detailed in his blog.

Rios said the method is particularly effective since if the request fails, the data will still be transmitted to the attacker's server without the victim knowing.

Rios wrote that there are two lessons to be learned: First, running untrusted SWF code is dangerous and that protocol handler blacklists "are bad."

An Adobe spokeswoman said the company has reviewed Rios' blog post and logged a bug, classifying it as a "moderate" risk according to its Adobe Severity Rating System.

"An attacker would first need to gain access to the user's system to place a malicious SWF file in a directory on the local machine before being able to trick the user into launching an application that can run the SWF file natively," she wrote.

"In the majority of use scenarios, the malicious SWF file could not simply be launched by double-clicking on it; the user would have to manually open the file from within the application itself."

Adobe and Google worked together on the security improvements in Flash. Last month, the two companies released to developers the first version of Flash that uses a sandbox. It works on Google's Chrome browser on the Windows XP, Vista and 7 operating systems.

The release is a continuation of a broad program by Adobe to improve the security of its products, which includes the introduction of a regular patching cycle timed with Microsoft's Patch Tuesday releases.

Adobe also uses a sandbox in its Reader X product, which was released in November. Reader's sandbox seals the application off from attacks designed to tamper with, for example, a computer's file system or registry. The sandbox interacts with the file system, but those communications go through a broker, which limits particular actions.


Adobe Flash sandbox security busted by researcher - Techworld.com
Glaswegian is offline  
Sponsored Links
Advertisement
 
Closed Thread

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is on
Smilies are on
[IMG] code is on
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off


Post a Question


» Site Navigation
 > FAQ
  > 10.0.0.2
Powered by vBadvanced CMPS v3.2.3


All times are GMT -7. The time now is 03:42 AM.


Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2020, vBulletin Solutions, Inc.
vBulletin Security provided by vBSecurity v2.2.2 (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
User Alert System provided by Advanced User Tagging v3.1.0 (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
Copyright 2001 - 2018, Tech Support Forum

Windows 10 - Windows 7 - Windows XP - Windows Vista - Trojan Removal - Spyware Removal - Virus Removal - Networking - Security - Top Web Hosts