Almost all Windows users vulnerable to Flash zero-day attacks

Over 90 per cent of PCs run at-risk Flash, 48 per cent have buggy Reader, says Secunia

More than 9 out of every 10 Windows users are vulnerable to the Flash zero-day vulnerability that Adobe won't patch until Thursday, a Danish security company said today.

According to Secunia, 92 per cent of the 900,000 users who have recently run the company's Personal Software Inspector (PSI) utility have Flash Player 10 on their PCs, while 31 per cent have Flash Player 9. (The total exceeds 100 per cent because some users have installed both.)

The most-current versions of Flash Player -- and -- are vulnerable to hackers conducting drive-by attacks hosted on malicious and legitimate-but-compromised sites. Antivirus vendors have reported hundreds, in some cases thousands, of sites launching drive-bys against Flash.

Secunia's PSI also pegged the installed base of the current Adobe Reader 9.1.2 and Abode Acrobat 9.1.2 at 48 per cent and 2 per cent, respectively. Because both include an interpreter to handle Flash content embedded in PDF files, they also can be exploited. The initial attacks, in fact, were based on rigged PDFs.

Adobe has acknowledged that Flash, Reader and Acrobat contain a critical bug. Last Wednesday, it kicked its security process into high gear, promising it would deliver patches for Flash by July 30, and fixes for Reader and Acrobat by July 31.

Until then, users have few options other than to delete, disable or rename the flawed component, "authplay.dll;" Adobe has posted terse instructions in a security bulletin, as have other organizations, including the U.S. Computer Emergency Response Team ( US-CERT).

The bug at the root of the vulnerability was first logged in Adobe's bug tracking database nearly seven months ago, at the end of 2008.

PSI scans Windows systems for installed applications, then compares their version numbers to the most up-to-date editions; if they're different, it makes note, then provides a link to the patch update. "[A] PC user with vulnerabilities in his installed software, is like a house owner with open or unlocked doors," said Mikkel Winther, the manager of Secunia's PSI partner program, in an e-mail. "Maybe nobody will rob his house or compromise his system, but it is indeed possible and he hasn't secured himself against it."

Adobe has been faced with one security emergency after another this year. In mid-March, it patched several Reader vulnerabilities, then followed that with two more updates in May and June. Also last week, after Secunia noticed that Adobe continued to provide an outdated edition of Reader for download from its Web site, Adobe said it might change how its software updater worked.

Read more: Australian PC users worse at patching Windows than New Zealanders, but both lead US: Secunia

Join the CSO newsletter!

Error: Please check your email address.

Tags adobe readerexploits and vulnerabilitiessecuniaWindowsadobe flash

More about Adobe SystemsCERT AustraliaComputer Emergency Response TeamPSAPSI

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Gregg Keizer

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place