Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Flash Player vulnerability exploited 2 weeks after Adobe's patch release

Flash Player vulnerability exploited 2 weeks after Adobe's patch release

2015/05/27

Softpedia - (International) Security researchers at FireEye discovered that cybercriminals are targeting outdated versions of Adobe's Flash player with drive-by attacks that leverage a memory corruption vulnerability to deliver the Bedep trojan, which initiates click-fraud activities and an infection cycle that funnels in additional malware through redirects. [ed.: Patching best practices would mitigate this vulnerability, and memory protection would stop this attack.]

Source: http://news.softpedia.com/news/Flash-Player-Vulnerability-Exploited-2-Weeks-After-Adobe-s-Patch-Release-482475.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:24:23