The code for a zero-day vulnerability affecting Adobe Shockwave Player has been published and the software maker has not yet promised a patch date.
Adobe acknowledged the hole affecting Shockwave Player 188.8.131.522 and earlier versions on the Windows and Mac operating systems, after a researcher made the exploit code public.
If exploited, the flaw “could cause a crash and potentially allow an attacker to take control of the affected system,” Adobe said.
“While details about the vulnerability have been disclosed publicly, Adobe is not aware of any attacks exploiting this vulnerability against Adobe Shockwave Player to date,” the firm noted in a security advisory.
Adobe said it is currently working on getting a schedule together for an update to address the vulnerability in Shockwave Player.
The company shares information about this and other vulnerabilities through the Microsoft Active Protections Program, which it joined in July.
Sharing this information with partners in the security community enables them to “quickly develop detection and quarantine methods to protect users until a patch is available,” Adobe said.
“As always, Adobe recommends that users follow security best practices by keeping their anti-malware software and definitions up to date,” the firm added.
IT PRO recently caught up with Brad Arkin, Adobe's director for product security and privacy, to talk about how the company tackles serious vulnerabilities.
This article originally appeared at itpro.co.uk
Copyright © ITPro, Dennis Publishing
Issue: 315 | May 2013
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.