Closed Bug 1181458 Opened 9 years ago Closed 9 years ago

Blocklist flash 18.0.0.194 for 0-days from HackingTeam dump, being used in the wild (CVE-2015-5119)

Categories

(Toolkit :: Blocklist Policy Requests, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED
2015-06

People

(Reporter: dveditz, Assigned: jorgev)

References

Details

(Whiteboard: [qa-])

Attachments

(1 file)

Adobe has released an advisory for a critical vulnerability (CVE-2015-5119) in Adobe Flash Player 18.0.0.194 and earlier versions for Windows, Macintosh and Linux: 
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html

This 0-day was found in the HackingTeam hacked files and was quickly added to Metasploit and has been reported in 3 different exploit packs being used as a vector for crypto-ransomware and ad-ware.

Adobe is expecting to release a fix later today (Wednesday). We should blocklist the vulnerable version (click to play, vulnerable) to stop the spread of this nasty stuff and encourage quick adoption of the new version when it's released.
lmandel: what's the next step in pushing this block along or getting it approved (by whom?)?
Flags: needinfo?(lmandel)
Details on the blocklisting process are at https://wiki.mozilla.org/Blocklisting#How_to_request_a_block

ni Jorge for visibility as we'll likely want to do this quickly.

Next step is to fill out the following template:

Plugin name:
Plugin versions to block:
Applications, versions, and platforms affected: 
Block severity: (hard/soft)

How does this plugin appear in about:plugins?
    File: 
    Version: 
    Description: 

Homepage and other references and contact info: 

Reasons:
Flags: needinfo?(lmandel) → needinfo?(jorge)
Assuming we do NOT want to simply extend the blocks enabled in bug 1177214 (we could, but we'd have to point the explanation pages at this new bug) then we want to blocklist

Flash Player Plugin 13.0.0.296 to 13.0.0.301 (click-to-play) 
Flash Player Plugin 18.0.0.194 to 18.0.0.202 (click-to-play)
Flash Player Plugin on Linux 11.2.202.468 to 11.2.202.480 (click-to-play)

The Good versions are:
  Mac and Windows:       18.0.0.203
  Mac and Windows (ESR): 13.0.0.302
  Linux:                 11.2.202.481

The other information matches that used in previous blocklisting of Flash as in bug 1177214
Summary: Blocklist flash for 0-days from HackingTeam dump, being used in the wild → Blocklist flash 18.0.0.194 for 0-days from HackingTeam dump, being used in the wild (CVE_2015-5119)
Assigning myself as QA, will go through the blocklisting once they're up on the staging server.
QA Contact: kjozwiak
Summary: Blocklist flash 18.0.0.194 for 0-days from HackingTeam dump, being used in the wild (CVE_2015-5119) → Blocklist flash 18.0.0.194 for 0-days from HackingTeam dump, being used in the wild (CVE-2015-5119)
The blocks have been staged. Kamil, please give them a look.

Flash Player Plugin 13.0.0.296 to 13.0.0.301 (click-to-play) 
https://addons-dev.allizom.org/en-US/firefox/blocked/p740

Flash Player Plugin 18.0.0.194 to 18.0.0.202 (click-to-play)
https://addons-dev.allizom.org/en-US/firefox/blocked/p742

Flash Player Plugin on Linux 11.2.202.468 to 11.2.202.480 (click-to-play)
https://addons-dev.allizom.org/en-US/firefox/blocked/p744
Assignee: nobody → jorge
Flags: needinfo?(jorge) → needinfo?(kjozwiak)
Keywords: qawanted
Win 8.1 x64 (VM):
=================

Build Used: http://ftp.mozilla.org/pub/mozilla.org/firefox/nightly/2015-07-10-03-02-06-mozilla-central/

Vulnerable:

* loaded several flash video's in non-e10s/e10s and ensured they where being blocked correctly

File: NPSWF32_18_0_0_194.dll
Path: C:\WINDOWS\SysWOW64\Macromed\Flash\NPSWF32_18_0_0_194.dll
Version: 18.0.0.194
State: Enabled (STATE_VULNERABLE_UPDATE_AVAILABLE)
Shockwave Flash 18.0 r0

File: NPSWF32_13_0_0_296.dll
Path: C:\WINDOWS\SysWOW64\Macromed\Flash\NPSWF32_13_0_0_296.dll
Version: 13.0.0.296
State: Enabled (STATE_VULNERABLE_UPDATE_AVAILABLE)
Shockwave Flash 13.0 r

Working:

File: NPSWF32_18_0_0_203.dll
Path: C:\WINDOWS\SysWOW64\Macromed\Flash\NPSWF32_18_0_0_203.dll
Version: 18.0.0.203
State: Enabled
Shockwave Flash 18.0 r0

Ubuntu 14.04.2 x64 (VM):
========================

Build Used: https://ftp.mozilla.org/pub/mozilla.org/firefox/nightly/2015-07-10-00-40-07-mozilla-aurora/

Vulnerable:

* loaded several flash video's in non-e10s/e10s and ensured they where being blocked correctly

File: libflashplayer.so
Path: /usr/lib/mozilla/plugins/libflashplayer.so
Version: 11.2.202.468
State: Enabled (STATE_VULNERABLE_UPDATE_AVAILABLE)
Shockwave Flash 11.2 r202

File: libflashplayer.so
Path: /usr/lib/mozilla/plugins/libflashplayer.so
Version: 11.2.202.466
State: Enabled (STATE_VULNERABLE_UPDATE_AVAILABLE)
Shockwave Flash 11.2 r202

Working:

File: libflashplayer.so
Path: /usr/lib/mozilla/plugins/libflashplayer.so
Version: 11.2.202.481
State: Enabled
Shockwave Flash 11.2 r202

OSX 10.10.4 x64:
================

Build Used: http://ftp.mozilla.org/pub/mozilla.org/firefox/releases/39.0/

Vulnerable:

* loaded several flash video's in non-e10s/e10s and ensured they where being blocked correctly

File: Flash Player.plugin
Path: /Library/Internet Plug-Ins/Flash Player.plugin
Version: 18.0.0.194
State: Enabled (STATE_VULNERABLE_UPDATE_AVAILABLE)
Shockwave Flash 18.0 r0

File: Flash Player.plugin
Path: /Library/Internet Plug-Ins/Flash Player.plugin
Version: 13.0.0.292
State: Enabled (STATE_VULNERABLE_UPDATE_AVAILABLE)
Shockwave Flash 13.0 r0

Working:

File: Flash Player.plugin
Path: /Library/Internet Plug-Ins/Flash Player.plugin
Version: 18.0.0.203
State: Enabled
Shockwave Flash 18.0 r0

Summary:

- blocklisting working correctly
Flags: needinfo?(kjozwiak)
The blocks are now live:

Flash Player Plugin on Linux 11.2.202.468 to 11.2.202.480 (click-to-play) 
https://addons.mozilla.org/en-US/firefox/blocked/p936

Flash Player Plugin 18.0.0.194 to 18.0.0.202 (click-to-play)
https://addons.mozilla.org/en-US/firefox/blocked/p938

Flash Player Plugin 13.0.0.296 to 13.0.0.301 (click-to-play)
https://addons.mozilla.org/en-US/firefox/blocked/p940
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → FIXED
Whiteboard: [qa-]
Target Milestone: --- → 2015-06
It's the gift that keeps on giving. There's a new 0-day (CVE-2015-5122) thanks to HT that Adobe plans on fixing in the coming days.[1] The rating is critical just like the one in the reference of this bug.

Looks like blocks would need to be updated to include up through:

18.0.0.204   (Flash Player Windows(.203)/Mac(.203)/Linux)
13.0.0.302   (Flash Player ESR)
11.2.202.481 (Flash Player Plugin on Linux)

[1] https://helpx.adobe.com/security/products/flash-player/apsa15-04.html
Thanks for the heads up macha! I created Bug # 1182751 as it's going to be a new block and this one is already resolved :)
Keywords: qawanted
* mancha! (apologies for the spam)
How am I supposed to update this plugin?
> How am I supposed to update this plugin?

You can get the latest Flash version from the following website:

- https://get.adobe.com/flashplayer/

You can also set Flash to automatically update via the "Updates" tab in the Flash Manager which is located under the "Control Panel". (see attached screenshot)
If you need to apply the update across multiple machines or if you simply want a standalone installer, [1] may be more convenient.

[1] https://www.adobe.com/products/flashplayer/distribution3.html
Product: addons.mozilla.org → Toolkit
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: