New critical flaw in the Flash plugin and new attack against its users. Adobe claims to have proposed a parade. CERT-EN is more skeptical.
Adobe has recently issued an alert on its graft Flash . A critical security vulnerability is present in Flash 188.8.131.52 and earlier on Windows, OS X, Linux, and Chrome OS.
Attacks are underway against the Windows 10 systems (and lower) with Flash 184.108.40.2066 (and lower).Attacks that allow hackers to take control of machines remote users.
The flaw is still not corrected to date. However, Adobe offers the cons-measures in Flash 220.127.116.11and higher. These would ward off pirate attacks. It is of course recommended that the graft update as soon as possible. Operation automatically by Chrome and – in recent versions of Windows – Internet Explorer.
However the CERT-EN has a different opinion on the effectiveness of the proposed parade by Adobe.“Adobe indicates that a security measure introduced from the Version 18.104.22.168 makes the exploitation of this vulnerability more difficult . CERT-EN recommends, however, disable the Flash Player plugin to the provision of a patch by the publisher “ thus reads the warning bulletin CERT-EN’s.
The organization also advises installing security tool EMET 5.5 of Microsoft , which will enhance the security level of Windows and its applications.