This information was sent to IT staff groups via email on May 13, 2015, with an update on May 27, 2015.
This message is intended for U-M IT staff who are responsible for maintaining and running university machines that have Adobe Flash Player and/or Adobe AIR products installed.
What is Replacing Adobe Flash Player. Adobe Flash Player is one of the few softwares that had a lot of popularity as it brought interactive content to the Web world and also introduced a new level of animation is now reaching the end of its life. The Flash Player plug-in has always been one of the must-have plug-ins among the PC users until the. Adobe AIR also uses Flash Player technologies to properly deliver rich internet applications on desktop and mobile devices. In terms of security, both Adobe AIR and Flash Player have multiple vulnerabilities. However, it’s safe to say that the latter has a higher risk. CpuAddressSize - Specifies whether the Flash Player or AIR application running on the system is 32-bit or 64-bit. API Reference Flash Player 31 and AIR 31 (September 11, 2018).
May 27 Update: Adobe Flash Player vulnerability CVE-2015-3090 is now being actively exploited. Unpatched machines can be compromised in order to deliver malware. Update affected machines as soon as possible. MiWorkspace-managed machines have been patched and are no longer at risk.
Summary
On May 12, Adobe released another set of security updates for Adobe Flash Player and AIR products for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions.
Affected Versions
Flash Player Fo Macbook Air
- Adobe Flash Player 17.0.0.169 and earlier versions
- Adobe Flash Player 13.0.0.281 and earlier 13.x versions
- Adobe Flash Player 11.2.202.457 and earlier 11.x versions
- AIR Desktop Runtime 17.0.0.144 and earlier versions
- AIR SDK and SDK & Compiler 17.0.0.144 and earlier versions
Action Items
Update Adobe Flash Player to the latest version by visiting Adobe Flash Player Download Center. Update Adobe AIR products by visiting Adobe AIR Download Center.
- Windows and Mac: Update to Adobe Flash Player 17.0.0.188.
- Linux: Update to Adobe Flash Player 11.2.202.460.
- Google Chrome: Will automatically update to version 17.0.0.188.
- Internet Explorer on Windows 8.x: Will automatically update to version 17.0.0.188.
- Extended Support Release: Update to version 13.0.0.289 by visiting Archived Flash Player Versions.
- Adobe AIR desktop runtime: Update to version 17.0.0.172.
- Adobe AIR SDK and AIR SDK & Compiler: Update to version 17.0.0.172.
Information for Users
MiWorkspace machines will be updated today, May 13. If you have Adobe Flash Player installed on your own devices that are not managed by the university, please update by visiting the Adobe Flash Player Download Center.
Flash Player For Mac
In general, the best protection for your devices is this: keep your software and apps up-to-date, do not click suspicious links in email, do not open email attachments unless you are expecting them and trust the person who sent them, and only use secure, trusted networks. For more information, see Spam, Phishing, and Suspicious Email,Instructions for Securing Your Devices and Data, and Use a Secure Internet Connection.
Questions, Concerns, Reports
Please contact iia.inform@umich.edu.
Sincerely,
ITS Information and Infrastructure Assurance
References
- Adobe Security Bulletin (Adobe, 5/12/15)
- Adobe, Microsoft Push Critical Security Fixes (Krebs on Security, 5/12/15)
- Angler EK Exploiting Adobe Flash CVE-2015-3090 (FireEye, 5/26/15)
Flash Player 9 and later, Adobe AIR 1.0 and later
Flash Player Macbook Air
Client computers can obtain individual files containing code, content, and data from a number of sources, such as from external websites, from a local file system, or from an installed AIR application. The Flash Player and AIR runtimes individually assign code files and other resources, such as shared objects, bitmaps, sounds, videos, and data files, to security sandboxes based on their origin when they are loaded. The following sections describe the rules, enforced by the runtimes, that govern what a code or content executing within a given sandbox can access. For more information on Flash Player security, see the Flash Player Developer Center topic “Security” at www.adobe.com/go/devnet_security_en . Remote sandboxesThe Flash Player and AIR runtimes classify assets (including SWF files) from the Internet in separate sandboxes that correspond to their domain of origin. For example, assets loaded from example.com will be placed into a different security sandbox than assets loaded from foo.org . By default, these files are authorized to access any resources from their own server. Remote SWF files can be allowed to access additional data from other domains by explicit website and author permissions, such as URL policy files and the Security.allowDomain() method. For details, see Website controls (policy files) and Author (developer) controls . Remote SWF files cannot load any local files or resources. For more information on Flash Player security, see the Flash Player Developer Center topic “Security” at www.adobe.com/go/devnet_security_en . Local sandboxesLocal file describes any file that is referenced by using the file: protocol or a Universal Naming Convention (UNC) path. Local SWF files are placed into one of four local sandboxes:
Communication between the local-with-networking and local-with-filesystem sandboxes, as well as communication between the local-with-filesystem and remote sandboxes, is strictly forbidden. Permission to allow such communication cannot be granted by an application running in Flash Player or by a user or administrator. Scripting in either direction between local HTML files and local SWF files—for example, using the ExternalInterface class—requires that both the HTML file and SWF file involved be in the local-trusted sandbox. This is because the local security models for browsers differ from the Flash Player local security model. SWF files in the local-with-networking sandbox cannot load SWF files in the local-with-filesystem sandbox. SWF files in the local-with-filesystem sandbox cannot load SWF files in the local-with-networking sandbox. The AIR application sandboxThe Adobe AIR runtime adds an additional sandbox, called the application sandbox, to the Flash Player security sandbox model. Files installed as part of an AIR application load into the application sandbox. Any other files loaded by the application have security restrictions corresponding to those specified by the regular Flash Player security model. When an application is installed, all files included within an AIR package are installed onto the user's computer into an application directory. Developers can reference this directory in code through the app:/ URL scheme (see URI schemes ). All files within the application directory tree are assigned to the application sandbox when the application is run. Content in the application sandbox is blessed with the full privileges available to an AIR application, including interaction with the local file system. Many AIR applications use only these locally installed files to run the application. However, AIR applications are not restricted to just the files within the application directory — they can load any type of file from any source. This includes files local to the user's computer as well as files from available external sources, such as those on a local network or on the Internet. File type has no impact on security restrictions; loaded HTML files have the same security privileges as loaded SWF files from the same source. Content in the application security sandbox has access to AIR APIs that content in other sandboxes are prevented from using. For example, the air.NativeApplication.nativeApplication.applicationDescriptor property, which returns the contents of the application descriptor file for the application, is restricted to content in the application security sandbox. Another example of a restricted API is the FileStream class, which contains methods for reading and writing to the local file system. ActionScript APIs that are only available to content in the application security sandbox are indicated with the AIR logo in the ActionScript 3.0 Reference for Adobe Flash Platform . Using these APIs in other sandboxes causes the runtime to throw a SecurityError exception. For HTML content (in an HTMLLoader object), all AIR JavaScript APIs (those that are available via the window.runtime property, or via the air object when using the AIRAliases.js file) are available to content in the application security sandbox. HTML content in another sandbox does not have access to the window.runtime property, so this content cannot access the AIR or Flash Player APIs. Content executing within the AIR application sandbox has the following additional restrictions:
Restrictions for JavaScript inside AIRUnlike content in the application security sandbox, JavaScript content in a non-application security sandbox can call the eval() function to execute dynamically generated code at any time. However, there are restrictions on JavaScript running in a non-application security sandbox within AIR. These include:
For details, see Code restrictions for content in different sandboxes . Setting the sandbox type of local SWF filesAn end user or the administrator of a computer can specify that a local SWF file is trusted, allowing it to load data from all domains, both local and network. This is specified in the Global Flash Player Trust and User Flash Player Trust directories. For more information, see Administrator controls and User controls . For more information on local sandboxes, see Local sandboxes . Adobe Flash ProfessionalYou can configure a SWF file for the local-with-filesystem sandbox or the local-with-networking sandbox by setting the document’s publish settings in the authoring tool. Adobe FlexYou can configure a SWF file for the local-with-filesystem sandbox or the local-with-networking sandbox by setting the use-network flag in the Adobe Flex compiler. For more information, see “About the application compiler options” in Building and Deploying Adobe Flex 3 Applications . The Security.sandboxType propertyAn author of a SWF file can use the read-only static Security.sandboxType property to determine the type of sandbox to which the Flash Player or AIR runtime has assigned the SWF file. The Security class includes constants that represent possible values of the Security.sandboxType property, as follows:
|