Security hole in Flash player could run attack code

A security hole in the way Macromedia Inc.'s Flash player handles ActiveX content could allow an attacker to run the code of their choice on vulnerable systems, according to a security advisory published by eEye Digital Security Inc. late Thursday. Macromedia is offering a new download of the player which fixes the flaw.

The vulnerability affects the Flash.ocx ActiveX component of the Flash player version 6 revision 23, and may affect earlier versions as well, Aliso Viejo, California, eEye said in its alert. The Flash.ocx component is installed with Internet Explorer, as well as with the Flash player, eEye said.

A buffer overflow in Flash.ocx could allow an attacker to run code of their choice on a vulnerable system when a user reads an HTML (Hypertext Markup Language) -formatted e-mail containing attack code, visits a Web site with attack code in it or uses Internet Explorer to display any other third party HTML, eEye said.

EEye said that Macromedia, based in San Francisco, was already aware of the issue when it contacted the company and that the latest version of the Flash player fixed the flaw. Users should upgrade to the latest version of the Flash player, version 6 revision 29, eEye said.

The updated Flash player can be downloaded at http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash.

What’s wrong? The new clean desk test
Join the discussion
Be the first to comment on this article. Our Commenting Policies