Adobe this week unexpectedly pushed an update to its popular Flash Player to address seven vulnerabilities, including one that was being publicly exploited.
The update to version 220.127.116.11 for Windows, Macintosh, Linux and Solaris includes a fix for a cross-site scripting flaw that was being used in targeted attacks against users of Internet Explorer on Windows, according to a security bulletin.
The bug was being leveraged in emails that tried to lure recipients to click on a link that leads to a malicious website, on which the attackers are able to take actions on the user's behalf.
The other flaws addressed by the update, which were not zero-days, could lead to malicious code execution, the bulletin said.
Wednesday's emergency release from Adobe likely will catch IT administrators off guard, said Andrew Storms, director of security operations at vulnerability management firm nCircle.
"In a perfect world, it would have been nice to get a little advance communication about the zero-day in Flash," he said.
For those organizations that can't update to the current version, Adobe also has made available an update for Flash 10.
This article originally appeared at scmagazineus.com
Copyright © SC Magazine, US edition
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @itnews.com.au to your white-listed senders.