Threat Advisory: Adobe Flash Player Multiple Vulnerabilities exploited in the wild

Sign words
CVSS V3 Base Score Metrics
CVE-IDCVE-2018-4878CVE-2018-4877
Exploitability MetricsAttack VectorNetworkNetwork
Attack ComplexityLowLow
Privileges RequiredNoneNone
User InteractionRequiredRequired
ScopeUnchangedUnchanged
Impact MetricsConfidentialityHighHigh
IntegrityHighHigh
AvailabilityHighHigh
TypeUse After Free/Remote Code ExecutionUse After Free/Remote Code Execution
Base Score8.88.8
Affected Products
Adobe Flash Player Desktop Runtime version 28.0.0.137 and earlier versions for Windows, Linux and Macintosh.Google Chrome version 28.0.0.137 and earlier for Windows, Macintosh, Linux and Chrome OS.Microsoft Edge and Internet Explorer 11 version 28.0.0.137 and earlier for Windows 10 and 8.1.
Vulnerability Information
#VulnerabilityIDDescription
1CVE-2018-4878A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to the handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
2CVE-2018-4877A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to quality of service functionality. A successful attack can lead to arbitrary code execution.
Safeguards/Recommendations
Software updates are given below:Adobe Flash Player Desktop Runtime Version 28.0.0.161Updates are available at Flash Player Download Center and Flash Player DistributionAdobe Flash Player for Google Chrome Version 28.0.0.161Updates are available at Google Chrome ReleasesAdobe Flash Player for Microsoft Edge and Internet Explorer 11 Version 28.0.0.161Updates are available at Microsoft Security AdvisoryAdobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 28.0.0.161 for Windows, Macintosh, Linux and Chrome OS.Adobe Flash Player installed with Microsoft Edge and Internet Explorer 11 for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 28.0.0.161.Vendor advisory is available.
IOCs
hxxp://www.1588-2040.co[.]kr/conf/product_old.jpg
hxxp://www.1588-2040.co[.]kr/conf/product.jpg
hxxp://www.1588-2040.co[.]kr/design/m/images/image/image.php
hxxp://www.dylboiler.co[.]kr/admincenter/files/board/4/manager.php
hxxp://www.korea-tax[.]info/main/local.php
hxxp://www.korea-tax[.]info/main/local.phploadswf_SWFBClass
hxxp://www.dylboiler.co[.]kr/service/store.php
hxxp://www.dylboiler.co[.]kr/admincenter/files/boad/4/manager.php
1f93c09eed6bb17ec46e63f00bd40ebb
4c1533cbfb693da14e54e5a92ce6faba
5f97c5ea28c0401abc093069a50aa1f8
9593d277b42947ef28217325bcc1fe50
394e52e219feb1a5c403714154048728
d2881e56e66aeaebef7efaa60a58ef9b
111d205422fe90848c2f41cc84ebd96a
3142fc8c1142f25698dabe8921996753
3f98c434d7b39de61a8b459180dd46a3
a47176bbc8aa136eb2814f3113617af7
f75a5e7ecc26c089c8d20406ea192c49
PDB path: F:\work\flash\obfuscation\loadswf\src
AV detection
McAfee         : Exploit-CVE2018- 4878.b
Kaspersky      : Exploit.SWF.Agent.rs
Sophos           : Exp/20184878-A
ESET-NOD32  : SWF/Exploit.CVE-2018- 4878.A
Mitigations
Administrators may also consider implementing Protected View for Office.  Protected View opens a file marked as potentially unsafe in Read-only mode.It is safe to uninstall/disable Adobe Flash from all machines in your organization.Disable Flash on a browser that does not display untrusted Flash content OR enable Click to Play function.Open the Security tab from “Internet Options” in Internet Explorer and set the security level of Internet zone and local intranet zone to “High”.Be careful not to open suspicious office files coming via unknown sender.If you are running Internet Explorer on Flash Player 27 or later and Windows 7 or later you may be able to avoid running it by prompting, to play SWF content.Yara rule implementation (not tested)Snort Rule
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:”Possible CVE-2018-4878 check-in alert”; flow:established,to_server; http_uri; content:”?id=”; http_uri; content:”&fp_vs=”; http_uri; content:”&os_vs=”; http_uri; reference: source, Vitali Kremez-Flashpoint; classtype:Trojan-activity; rev:1;)
Version History
Version 1.0Initial Report with Safeguards/Recommendations and the released fixes.

On 2018-03-05

Tags: No tags

Comments are closed.