![]() Windows users should treat this update with the utmost priority, Adobe said. The exploit targets Flash Player on Internet Explorer for Windows only. APK file, which Trend Micro detects as ANDROIDOSBOXER.A. ![]() There are reports that the vulnerability is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious file delivered in an email message. To further entice users into downloading the fake Adobe Flash Player app, the text on the webpage claims that it is fully compatible with any Android OS version: When users opt to download and install the said fake app, the site connects to another URL to download malicious. ![]() "These updates address an object confusion vulnerability (CVE-2012-0779) that could cause the application to crash and potentially allow an attacker to take control of the affected system," Adobe said. Adobe has shipped an extremely urgent Flash Player patch to block in-the-wild malware attacks against Windows users.Īdobe described the attacks as "targeted" and warned that malicious Flash files are being delivered in e-mail messages.Īlthough the vulnerability affects Flash Player on all platforms, the malware attacks target Flash Player on Internet Explorer for Windows only.Īccording to Adobe's advisory, the patch is available for Adobe Flash Player 11.2.202.233 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.7 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.8 and earlier versions for Android 3.x and 2.x.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |