Adobe Adds Flash Privacy Controls

  /     /     /  
Publicated : 22/11/2024   Category : security


Adobe Adds Flash Privacy Controls


Flash Player and Google Chrome get patches against attacks currently seen in the wild.



Recommended Reading:
--
Adobe Flash Attacks Exploit Zero-Day Vulnerability
--
Online Privacy Battles Advertising Profits
Adobe is aiming to make Flash safer for users, in part by blocking questionable website-tracking practices.
The company on Thursday released Flash Player version 10.3, which now enables users to wipe the data stored by Flash from within the browser. That capability is designed to help people block the use of persistent Flash cookies--also known as Local Shared Objects (LSOs)--which some advertisers use to
surreptitiously track
every website that a user visits, regardless of their cookie or cache settings.
The new plug-in-wiping feature is facilitated by an API known as
NPAPI:ClearSiteData
. This new API allows the browsers to communicate a users desire to wipe user data stored by installed browser plug-ins. Now, when users go into their browser settings to clear their browser history or clear their cookies, they will be able to clear both their browser data as well as their plug-in data, according to a
blog post
from Adobe.
Any browser plug-in can use the new API, though Flash is the first to do so. For open source browsers, the functionality is currently only available for Chrome developers, but Adobe said we expect to have official support across all open source browsers in the near future. Meanwhile, Adobe also worked with Microsoft to develop an equivalent capability--now live--for Internet Explorer 8 and 9.
The use of persistent Flash cookies, however, may be waning. Adobe pointed to a January 2011
report
from Carnegie Mellon University, commissioned by Adobe, which found that only two of the top 100 websites were using Flash cookies. A check of 500 websites randomly selected from a list of the million most popular sites in the U.S. found none. Interestingly, both of the sites that were using Flash cookies discontinued the practice, one on its own, and one after being contacted by the Center for Democracy and Technology, which helped with the study.
The updated Flash Player also patches multiple critical vulnerabilities present in Flash Player 10.2 for Windows, Macintosh, Linux, Solaris, and Android. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system, according to Adobes security bulletin.
Related attacks utilizing Microsoft Word and Excel files with a malicious Flash (.swf) file embedded in them have been seen in the wild, targeting Windows. However, to date, Adobe has not obtained a sample that successfully completes an attack, it said.
The revamped Flash Player also adds an operating system control panel--in Windows, Apple OS X, and Linux operating systems--for tweaking all Flash settings. Adobe said its also introduced an automatic update notification for Macintosh users, which Windows users already had. In the past, Mac users often had trouble keeping up with Flash Player updates since the Mac OS and Flash Player ship schedules are not in sync, Adobe said.
The Flash Player update has already been built into the latest version of Google Chrome, also released on Thursday. That version of Chrome also patches two critical vulnerabilities, one involving WebKit, the other involving scalable vector graphics filters. Both of the issues were discovered by Google.
According to vulnerability information service Vupen, the vulnerabilities relate to integer overflows and memory corruptions in WebKit and Flash, which could be exploited by remote attackers to compromise a vulnerable system by convincing a user to visit a specially crafted Web page.
Interestingly, Vupen and Google are still
tussling
over Vupens assertion that it hacked Chromes sandbox from within the browser itself, using two zero-day vulnerabilities. But Google information security engineer and
full-disclosure aficionado
Tavis Ormandy said via a Twitter post that Vupen misunderstood how sandboxing worked in chrome, and only had a flash bug.
For the moment, Vupen has only released details of the vulnerability to its
government customers
.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Adobe Adds Flash Privacy Controls