Workspace

Adobe Patches Zero-Day Flash Player Flaw

Sean Michael Kerner is a senior editor at eWeek and contributor to TechWeek

Follow on: Google +

Adobe has issued an unscheduled update fixing a security flaw in Flash Player that it warns is being actively exploited

Adobe issued an unscheduled zero-day update for a security issue on 20 February for its Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh, and Adobe Flash Player 11.2.202.336 and earlier versions for Linux.
Adobe summit logo

Active exploitation

“These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system,” Adobe warned in its advisory.

In total, the Adobe update is fixing three identified common vulnerabilities and exposures (CVEs). Adobe noted that only one of them (CVE-2014-0502) is actively being exploited in the wild.

According the National Vulnerability Database information on CVE-2014-0502, the flaw has the highest possible score for impact and exploitability, which means it’s a real and present danger.

Server redirection

Security vendor FireEye claimed in a blog post that it first became aware of CVE-2014-0502 on 13 February. FireEye noted that the Peter G. Peterson Institute for International Economics as well as the American Research Centre in Egypt and the Smith Richardson Foundation were all redirecting visitors to a server hosting the CVE-2014-0502 exploit.

“All three organisations are nonprofit institutions; the Peterson Institute and Smith Richardson Foundation engage in national security and public policy issues,” FireEye stated.

Are you a security pro? Try our quiz!