Adobe Adds Flash Privacy Controls
Flash Player and Google Chrome get patches against attacks currently seen in the wild.
-- Adobe Flash Attacks Exploit Zero-Day Vulnerability
-- Online Privacy Battles Advertising Profits
Adobe is aiming to make Flash safer for users, in part by blocking questionable website-tracking practices.
The company on Thursday released Flash Player version 10.3, which now enables users to wipe the data stored by Flash from within the browser. That capability is designed to help people block the use of persistent Flash cookies--also known as Local Shared Objects (LSOs)--which some advertisers use to surreptitiously track every website that a user visits, regardless of their cookie or cache settings.
More Security Insights
White PapersMore >>
The new plug-in-wiping feature is facilitated by an API known as NPAPI:ClearSiteData. "This new API allows the browsers to communicate a user's desire to wipe user data stored by installed browser plug-ins. Now, when users go into their browser settings to clear their browser history or clear their cookies, they will be able to clear both their browser data as well as their plug-in data," according to a blog post from Adobe.
Any browser plug-in can use the new API, though Flash is the first to do so. For open source browsers, the functionality is currently only available for Chrome developers, but Adobe said "we expect to have official support across all open source browsers in the near future." Meanwhile, Adobe also worked with Microsoft to develop an equivalent capability--now live--for Internet Explorer 8 and 9.
The use of persistent Flash cookies, however, may be waning. Adobe pointed to a January 2011 report from Carnegie Mellon University, commissioned by Adobe, which found that only two of the top 100 websites were using Flash cookies. A check of 500 websites randomly selected from a list of the million most popular sites in the U.S. found none. Interestingly, both of the sites that were using Flash cookies discontinued the practice, one on its own, and one after being contacted by the Center for Democracy and Technology, which helped with the study.
The updated Flash Player also patches multiple critical vulnerabilities present in Flash Player 10.2 for Windows, Macintosh, Linux, Solaris, and Android. "These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system," according to Adobe's security bulletin.
Related attacks utilizing Microsoft Word and Excel files with a malicious Flash (.swf) file embedded in them have been seen in the wild, targeting Windows. "However, to date, Adobe has not obtained a sample that successfully completes an attack," it said.
The revamped Flash Player also adds an operating system control panel--in Windows, Apple OS X, and Linux operating systems--for tweaking all Flash settings. Adobe said it's also introduced an automatic update notification for Macintosh users, which Windows users already had. "In the past, Mac users often had trouble keeping up with Flash Player updates since the Mac OS and Flash Player ship schedules are not in sync," Adobe said.
The Flash Player update has already been built into the latest version of Google Chrome, also released on Thursday. That version of Chrome also patches two critical vulnerabilities, one involving WebKit, the other involving scalable vector graphics filters. Both of the issues were discovered by Google.
According to vulnerability information service Vupen, the vulnerabilities relate to "integer overflows and memory corruptions in WebKit and Flash, which could be exploited by remote attackers to compromise a vulnerable system by convincing a user to visit a specially crafted Web page."
Interestingly, Vupen and Google are still tussling over Vupen's assertion that it hacked Chrome's sandbox from within the browser itself, using two zero-day vulnerabilities. But Google information security engineer and "full-disclosure" aficionado Tavis Ormandy said via a Twitter post that "Vupen misunderstood how sandboxing worked in chrome, and only had a flash bug."
For the moment, Vupen has only released details of the vulnerability to its government customers.
In the new, all-digital issue of InformationWeek: Our 2011 Strategic Security Survey shows increased executive interest in security. Here's what you should do next. Download it now. (Free registration required.)