Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Two more Flash 0-days emerge in Hacking Team leak (theregister.co.uk)
198 points by danso on July 12, 2015 | hide | past | favorite | 182 comments


Important PSA for Skype Users: Open up "Internet Options" (yes, the ones in internet explorer), security tab, and add https://apps.skype.com to the "Restricted Sites" list. Skype will still work fine, however there will be no advertisements.

This is important because Microsoft seems to use a lot of Flash advertisements without checking them (I've had plenty of "MICROSOFT VERIFIED DRIVER FIXING" ads come up inside of Skype, so I'm sure some zero day could slip though their ad system)


Skype on Windows has ads? Is that a recent thing? The Mac version doesn't, or not yet, anyway.


It's had ads for at least two years now. That was the last time I used it on Windows.


The OS X version now has ads, but only on certain pages. Highly annoying. This was one of the historical differentiators.


If you want to do this on a Mac you can use software such as Little Snitch. Create a rule prohibiting Skype to connect to apps.skype.com.


I would like to hear what Adobe have to say about their streak of serious security problems. Not only that, but they should face some consequences for that neglect. At least be forced to publish a working spec for Flash.


If there were actually a government body that cared about "cyber"-security, they'd be hauled up in front of it. They're basically an infosec Bhopal - creating a toxic mess that other people have to clean up over a period of decades.


In essence there are not critical US systems running on Flash and so the defensive side of NSA don't care. And the offensive side is just happy to let it rot, as that means more opportunities for them.


The thorn in the side of removing Flash has been VMware, who, in their latest vSphere 6 release, clearly made the point that "Flash is the future", with announcements towards deprecating their alternative clients.

I don't understand what they are thinking - it used to be such a progressive company.

I don't know about US Government, but many Governments and sensitive organisations are still using VMware, and this isn't likely to change.


Where can I find information on this?


But "thanksfully" they've switched to WordPress on the Whitehouse site and hired the maintainer , so they are improving netsec on THAT front. :) Which is actually a good thing for hosters worldwide.


Can we get Adobe declared a Superfund clean up site?


>They're basically an infosec Bhopal

I lul'd.


If they say much of anything, they will probably just reiterate that they take security very seriously.


You think that any other software you use is any better? Flash gets it rough because it's widely used and independent of the browser (for the most part).

If you're running an update to date flash, that means you're probably running it in a sandbox and probably have silent auto updates turned on. That's good enough for most people.

If you're the kind of person that's going to get specifically targeted, then you should not only reconsider running flash on your computer, but any other program written in an unsafe language.

Or, you know, segregate your data.


"You think that any other software you use is any better?"

I certainly HOPE most software I use can do better than this: http://www.cvedetails.com/vulnerability-list/vendor_id-53/pr...

To be certain, Flash gets a lot of attention because of its install base - but it's been a never-ending FOUNTAIN of RCE bugs for much of the last decade.


data: I grabbed all 500+ records and counted, by month, those with severity 10 (column 10) and severity >= 7 (column 7). Rows is the # of cve records for that month.

it's not awesome

   month   rows 10  7
   2015-07   35 28 29
   2015-06   14  7  7
   2015-05   17 10 10
   2015-04   22 19 19
   2015-03   11  7  9
   2015-02   19 19 19
   2015-01   12  9 11
   2014-12    6  5  5
   2014-11   19 16 18
   2014-10    3  3  3
   2014-09   12 11 12
   2014-08    8  7  7
   2014-07    3  0  2
   2014-06    6  1  3
   2014-05    5  0  5
   2014-04    4  1  2
   2014-03    4  2  2
   2014-02    4  3  4
   2014-01    2  2  2
   [...]
2015 has not been kind to them, but it's been a continuous trickle of remote severity 10s every month for a year and a half

truncated because it took too much space; full results: https://gist.github.com/anonymous/763e28612b74d3a1817a

NB: only months with at least one cve event show up, but given adobe's focus on security, it wasn't really necessary to fill in months with 0 events to get the point across

download each screen full of results from the cve site into a single directory and run this script: https://gist.github.com/anonymous/990bfe126d273ef84134


Vulnerabilities increase and usage decreases. I wonder if an economically sensible decision should be to EOL Flash soon. Are they still doing any money out of it?


I answer to myself because I just read this http://www.theverge.com/2015/7/13/8948459/adobe-flash-insecu... from Facebook's CSO.

"It is time for Adobe to announce the end-of-life date for Flash and to ask the browsers to set killbits on the same day. — Alex Stamos (@alexstamos) July 12, 2015"


Most software that's as complex as Flash is probably similarly full of bugs. Most of those vulnerabilities reek of huge development teams toiling over a codebase whose foundation was written in the late 90s and had features and fixes duct taped ever since.


Do Chrome and Safari have as bad a track record?

Flash has been insecure since originally launched.


In a way, yes, they do. Chrome pushes out a dozen or more fixes for remotely exploitable vulnerabilities every 2 weeks.


No they don't. Chrome is designed from the ground up for security. It has the same number of bugs as other software of it's size but the type of bugs are much less severe.

Compare FF, Safari, IE, Chrome. Same number of bugs per yet but Chrome has 10x less code execution bugs (ie, 10x less likely for your machine to be owned by unknown bugs)

http://i.imgur.com/rVgu7Fs.png


The chart you just linked (which doesn't show a timescale) shows Chrome with over 300 exploitable bugs. I doubt the denial of service label, that just usually means that a bug wasn't fully investigated. So, again, how is this different from Flash? Chrome is riddled with vulnerabilities (and Safari is too).

Flash runs in a low-priv environment is nearly every major browser, includes application-specific exploit mitigations, and it silently auto-updates, just like Chrome. It's all a matter of the Flash install base: it's in 90%+ of browsers and it's running the same-ish codebase in all of them, making it a relatively stable platform to develop exploits for. That's it! It's more a factor of market share and not "security."

Every document reader, HTML renderer, JavaScript engine, browser, media player, etc that you use is the same -- a house of cards built on poor memory management :-/.


  > Chrome pushes out a dozen or more fixes
  > for remotely exploitable vulnerabilities
  > every 2 weeks.
That equates to 288 remotely exploitable vulnerabilities in Chrome per year.

Here is a chart from the same source with a timeline of sorts: http://www.cvedetails.com/product/15031/Google-Chrome.html?v...

Your statement about Chrome is clearly way off, and that's what your parent was addressing. He never said Chrome was bug-free. And he was right to say that Chrome is way ahead of the other browsers (according to these stats, at least).

Edit: those stats show Chrome is better in terms of CVE severity, not number of annual CVEs.


I don't think the classification of most of those DoS bugs are correct. I also don't think there's a big difference between 100 vulns per year and 300 vulns per year. You go fishing and you find some each time.


> a house of cards built on poor memory management :-/.

Shit, this is the most accurate description of modern software that I've seen so far.


no, maybe not as bad, but JIT can be played pretty hard. I think the difference is that they are better structured and more transparent. I would definitely NOT put my hands on flash code, must be a mess!


"Probably"? Complex as Flash? Whatever it have a big or small team, was started in the late 90s or whatever it causes problems now. So use whatever excuses you like, Flash is still a security concern with opportunity for more 0-day exploits(just one firm have two in the drawer, how many more there are?).


Flash gets it rough because it's horribly-written software full of security holes. It's demonstrably worse than most anything else out there.


Every piece of software you use is on a constant month-to-month patch train. Chrome, Windows, Firefox, Quicktime, Adium, hell even OpenSSL updates for security-critical bugs about once a month now. Flash is nothing special. All your software is insecure.


Flash "auto updates" are anything but.

On Windows, you get a pop-up to update manually, which just sends you to their website so you need to download and run the installer by yourself.

If you don't update manually, Flash will wait 45 days before triggering an automatic update. I never waited that long, so I don't know whether it's "silent" or not.


Their clientele isn’t security wary people. Plus they don’t have any serious competition in most of their products so it can’t hurt them either way. So they’ll probably issue a generic statement and move on with their lives.

As for consequences, the best thing most of us could do is disable Flash from the browser. I’ve done it since YouTube defaulted to HTML5 video and never looked back since.


i'm not sure if it's relevant whatever they'd have to say.

Just look at the news for the past years and there's only 1 conclusion: uninstall Flash or accept increased risk of catching a virus.


you probably can lookup news archives of the last ~15 years for that


:) I was at a security meeting, I've heard the same reply. I am really not sure why it's still so used though.


How about making police raid homes and forcefully uninstall Flash Player?


Why waste money on police raids when you can exploit Flash to put "malware" on their computer that uninstalls Flash?


Should we also ask what Microsoft has to say about their consistent streak of serious security problems in IE and Windows?


Serious question: why are people still using Flash? I'm surprised by the number of websites that use it.


I can think of one use case where Flash still makes sense: Live video

A lot of people seemed to be surprised this is the case but tell me what single live streaming protocol is supported across all browsers without a plugin?

With Flash you can stream HLS (HTTP Live Streaming) to a Flash player in full browsers while just directly loading the same HLS playlist in mobile browsers via native players (iOS / Android).

This means you can deliver live streaming over the same audio/video codec (H.264/AAC) and over the same protocol (HLS). This vastly simplifies your streaming infrastructure and removes the need for transcoding on the server, unless you just want to create different qualities for adaptive bitrate streaming.

It would be nice if "desktop" browsers all supported HLS and H.264/AAC natively, that would be a real Flash killer.


You're right, live video without Flash is not nearly as advanced. However, there are several options that work right now:

- Plain old HTTP WebM stream. Only one resolution, but it works. - MPEG-DASH - very similar to HLS, but implementable in Javascript via MSE APIs in browsers today. - WebRTC - low latency streaming, in some cases it might make sense to use this over MPEG-DASH even for one-to-many streaming cases, like interactive lectures and the like.

Unfortunately several browsers lag behind in implementing the required APIs, so this does not solve all problems yet. But the problem isn't creating any new protocols, it's just getting adoption.

As for H.264, it's mostly a solved problem with hardware decoders and OpenH264 (currently not used for <video> playback, but could be). AAC, however, costs more to license and is much more problematic, so there will always be some browser vendors that don't ship it.


Yes except if you want 1080p60 you just won't be able to use Flash because even on fast computers the CPU overhead is killer.


I don't have those issues with 1440p Flash video on OS X running decent hardware.

That said, I truly wish these remaining use cases for Flash were unnecessary, I would not miss it at all.


A lot of advertising networks use it to deliver advertisements. Whether it is simple inertia at this point, or because the networks can get a better fingerprint using flash, I don't know.

Also, it used to be the case that Flash had better DRM controls on it, but I'm pretty sure that reason is no longer the case since Encrypted Media Extensions got rolled out.

However, that doesn't explain why Facebook's on-site video player uses Flash.


The advertising networks being the last to use it is something that will make Flash's implosion very quick and sudden, IMO.

If uninstalling flash only causes you to miss out on ads, it makes uninstalling flash that much more attractive. Which makes the advertisers want to get off flash that much sooner.

It needs probably just one or two more use cases to disappear (Facebook video is one of them), and its final death will be quite quick.


Which is what makes these exploits so insidious: sneak an infected advertisement onto one network, even briefly, and you're now targeting who knows how many Internet users visiting legitimate, trusted websites.

Honestly, one of the biggest reasons to run an ad blocker is the significantly reduced attack surface.


Facebook appears to have moved to an html player in the last few days.


Not for everyone, apparently. I'm still being prompted to install a plugin.

Not only that, but images flagged as "gif" also prompt me to install flash (amazing how oddly these new features get implemented!).


Facebook currently only supports HTML5 video for Windows 7+.


YouTube's Flash player still works a lot better than the HTML5 one. Their HTML5 one desynchs the audio occasionally, cuts off the audio before the video ends, doesn't support a real right click -> copy video URL (all it can do is give a popup with the URL), and still has other small bugs. The Flash one has none of these problems.

It seems to be the case in general for most sites that offer HTML5 alternatives that the Flash version is much more solid. Maybe using HTML5 video in these domains is inherently error-prone, maybe it isn't, but in practice it almost always gets screwed up.

Plus people still use flash games and sites like Newgrounds.


YouTube's HTML5 video player has always been a shit-show, and I don't understand why. Vimeo has had an excellent HTML5 video player for many years, and there's at least a few third-party HTML5 video players that are pretty good as well.


Speak for yourself. YouTube's HTML5 video player has always been stellar for me.


Are you sure you're actually using the HTML5 player? I am being 100% serious when I say I've never met someone before who thinks YouTube's HTML5 player is good.

Among the various issues I've seen:

* Sometimes refuses to play anything, without showing any errors, requiring a reload of the page.

* Occasional poor performance.

* Audio/video desynchronization

* Scrubbing the video often causes it to get stuck, refusing to play, until I scrub it again

* Videos often take longer to start playing than with the flash player.

* Fullscreen is sometimes broken

* Switching from regular mode to "theater" mode sometimes leaves the video playing in its original size, anchored to the corner of the now-larger black area that it should be playing in.

I think it's gotten a little better recently (i.e. I see issues less often), but it's still far from great.

And before you ask, I've seen these issues in both Safari and Chrome.


Yes, I'm using the HTML5 player. This is easily verified by clicking the right mouse button on the video and seeing the HTML5 context menu. I have no problems with it at all and it's easily superior to the Flash player in performance and resource usage. It also seamlessly plays 1080p 60FPS video without any issues.

As for the issues you're experiencing - are you sure you have GPU acceleration turned on?

I'm using Chrome and CPU usage is only 45-50% for perfect 1080p 60FPS playback.


> and it's easily superior to the Flash player in performance and resource usage.

Not on older (3y+) machines.


All such comments about not working flash player on youtube make me think of some kind of adobe shills maybe? Or PEBCK. Unless you have some super lame vidoe card I do not see how one can not make HTML5 player work. My experience: HTML5 player works really well on youtube, been using it for at least a year (well possibly +- couple months) exclusively. No problems after configuration, machine is quite old q6600 cpu that is 5-6 years old and GF220, which is also quite old now. Full hd video ON Linux (!), Firefox no problems (though possibly just 30fps, not sure if I ever try 60fps). And people complain all over the place about HTML5 youtube on Linux.


Fine. I cannot argue about _your_ experience. _My_ experience is different. One of my computers is really old Pentium M laptop (9y old) and HTML5 barely works at 240p. Not only that, it has limited set of resolutions at the first place. Flash works just fine 480p resolution. It looks also much better at lower bitrates (to _my_ taste) than HTML5 in Firefox

> make me think of some kind of adobe shills maybe

Delusions or paranoia may be?


It was far less personal than that, I generaly only lurk on HN, but your post one that struck a nerve finaly, after many similar posts here and in /..

Also 9 year old is quite a frac cry from your initial post of "(3y+) machines", 9 year old machine almost guaranteed has absolutely no support in hardware for modern codecs. So no wonder has strong limitations on resolution. Still flash working better than HTML5 players is still suspicious to me, I still believe with correct configuration reverse should be true, as flash is basically just another layer in between screen and bits on the net. Though possibly not applicable in all cases.


9y old machines is what many people (not gamers, enthusiasts etc.) have; 3+ y old include underpowered Celeron 847, AMDs (way weaker than your monstrous Q6600) and even on these machines Flash works better. _My_ _actual_ observations.

> Still flash working better than HTML5 players is still suspicious to me,

Do you write programs for life or what? It is not a problem with HTML5 players, it a problem the way they are written. Flash is an older product, with better support of legacy or underpowered products.

> I still believe with correct configuration reverse should be true

Yes, the correct configuration is "more powerful CPU".


I am not the person you are replying to but I do not have flash installed on my system. I have to do an occasional reload but I've never had to do anything else you have mentioned.

For reference, I use chromium (not chrome) on Linux (which does not come with flash bundled).


The HTML5 video in iOS is rock solid (Safari/Chrome on iOS). The Chrome/Firefox/IE HTML5 video implementations could be a bit better (in comparison).


This is like asking why people still use cash when there are so many other easier to use & manage payment options. The simple answer is there are far too many edge cases where it's still required - any single one doesn't sound like a good answer.


Cash is still the most anonymous way to pay for something also, at least for most people.


I think the truth is, technology that supplants it is still not there yet. Sockets, sound, video...

And there's still a truckload of fun games available only in flash form, which makes flash relevant even if the number of new stuff coming out in it dwindles.


Twitch. Which happens to amuse me, which I like to waste time. But .. they seem unwilling to move away from Flash (the only thing I found was a ~3 year old support thread that wants to .. support HLS. Yay. Not that's not helpful)


Twitch without Flash has been available for a while now, if you were willing to use VLC + an IRC client. Twitch HTML5 chat went live on June 30th, HLS was prior to that.

I'd say they're open to ditching Flash.


VLC for HLS I assume (and I only stumbled upon the '/hls' suffix for any url to support that by accident/in that ticket, which still doesn't seem to be officially closed).

IRC for chat is absolutely new to me and would actually be quite nice..



Is there a nice way to get the stream to open in VLC?


idk about VLC, but with mpv you can just type "mpv http://www.twitch.tv/streamername" and it plays.


Twitch works just fine with HTML5 these days, including chat.


How do you get the video to play with HTML5?


Works out of the box on Safari 8 with no Flash installed.

Edit: proof: http://i.imgur.com/myfsoNv.png


It's using HLS, so not really HTML5 but an Apple specific proprietary extension.

The HTML5 solution is usually to run DASH via a JS demuxer utilizing MSE.


Wonder if they'll ever ad support for Firefox.


Ubiquiti products require it for some functionality, and they're wildly popular for Wifi and wireless ISPs right now.

I actually just filed a complaint on their forums.

http://community.ubnt.com/t5/UniFi-Wireless/BUG-Adobe-Flash-...


Their latest controller (v4?) removed the Flash requirement for both video (playback) and main (maps) IIRC. Do they still have leftover areas that require Flash?


v4 is a long way from being a stable release


Ah, I was under the impression that they've officially moved it out of the 'beta' naming


wtf are you complaining for? You don't like flash and they are removing it.


ubnt has a habit of not finishing what they start. AirControl 2 is not finished and they're talking about Aircontrol 3. Airvision has been rewritten 3 times in 3 years.

For all I know they're doing Unifi 5 in pure flash. I wouldn't be surprised.


What ubnt products require flash? airOS works fine for me without flash.


Unifi 3.x requires flash to manage devices on a map. It's the main screen you see when you log in.

Unifi 4.x is still beta and I'm not sure if it still requires flash (Though for Ubnt stable means beta, beta means alpha, alpha is unlikely to even run.)

Last I checked AirControl did too (managing many AirOS devices)


What websites use it? I've not encountered a single incompatible website recently, and haven't had flash installed for a long time now.


Facebook's inline video player uses it. On linux, I get a popup saying that I must install Flash.


In Safari on OS X, Facebook does use the native <video> player.

I'm guessing that Facebook encodes video h264 which isn't natively supported in Firefox; rather it relies on support in the operating system. I'm not sure if Chrome on Linux supports h264, however since Chrome also includes its own Flash player I guess that Facebook may be using their own flash player anyway.


Pretty sure there are some settings you need to enable in about:config to get H264 working in Firefox (assuming you have the right gstreamer stuff installed).


Firefox can also install the free Cisco h.264 codec.


FB is using it a lot. For videos, for uploading pictures.


BBC iPlayer is flash-only


Not just iPlayer - the main BBC website - including news/weather/sport - requires Flash to display all video content on desktops.


Porn sites.


All my frequent porn sites support HTML5 video now


Good question. There were some I had to use Chrome to view (espn, cnn, facebook-- somebody) and I was quite surprised.


twitch.tv


You can play streams with: livestreamer

http://docs.livestreamer.io/

And chat trough their irc server.


I don't think that's needed, i'm looking at Twitch right now (via the normal way) - and i don't have Flash installed.


On an iOS or Apple device?


OS X, Yosemite, Safari


HBO Go


My 401k provider -- that btw I can't choose -- fucking uses flash for their entire website.


It seems like some B2B software vendors use it to keep people from seeing/manipulating their frontend code in web-based applications.


Unfortunately advertising managers love Flash. Technicaly there is no reason to use (see iOS Safari HTML dealing with video).


And this is just one non-governmental setup's arsenal.


The good part is that this removes the same vulnerability for everyone.


My point, though, is that if a random Italian consultancy can amass multiple Flash 0-days, the folks at the NSA with the $10+ billion budget probably have an essentially endless supply of them (not to mention exploits for other software) at the ready.


Is there any Flash security bug recently which makes it outside the Chrome sandbox?


Yep, the one that became public 5 days ago [1]

[1]: https://krebsonsecurity.com/2015/07/adobe-to-patch-hacking-t...


Only when used in tandem with a Windows exploit:

"A spokesperson for Google confirmed that attackers could evade the Chrome sandbox by using the Flash exploit in tandem with another Windows vulnerability that appears to be unpatched at the moment."


The Chrome sandbox isn't as strong as you might think. Flash needs access to a ton of stuff to work: - Camera / Microphone - Filesystem - GPU So there's plenty you can do without escaping the sandbox.


Hacking Team developed digital smallpox, and failed to safeguard it.

Thanks.


I'm as grossed out by HT as the next message board nerd, but they didn't develop these bugs; modern industrial software development did. All HT did was weaponize them. These guys aren't the sharpest tools in the shed, so I think you can safely assume other people weaponized these, or worse bugs, as well.


HT purchased these vulnerabilities with an understanding that they would not be made public and patched. Then they failed to safeguard them. Clearly these O-days, and conceivably all computer vulnerabilities, are not close to being as bad as smallpox, but what ethical obligations do actors (companies, governments, hackers, researchers) have to protect vulnerabilities which they plan to not protect the public again?

Say you discover a very powerful attack on AES which allows you under many circumstances to recover the key:

1. do you have an ethical obligation to warn affected parties?

2. If you don't and instead secretly sell this decryption capability to governments and/or private actors, do you have an obligation to ensure that this capability isn't used illegally or unethically?

3. What due diligence is required to protect a vulnerability of this scale?


I do not disagree. In fact, I personally have a problem with all non-vendor vulnerability sales, for the same reason.

I just think we should be clear that exploit developers, brokers, and users don't actually create vulnerabilities; software companies do.

I also think people should give Adobe a little bit of a break --- not much of one, but a little. Adobe got monstrously successful off a codebase that largely predates the concept of software security. It's a nightmare problem for them, and they are working on it. They should work harder.


Macromedia/Adobe has had 15 years to respond to the news that Internet security matters. 15 years.


15 years ago a pretty sizable chunk of the industry thought heap overflows weren't exploitable for code execution, so I don't think that's the right interval.


Then what is?


Why don't you 100% blame the people at fault: Adobe / the original developers.

First, they were incompetent enough to not correctly develop their software.

Second, non-assholes would have a standing price-match policy for bugs. Adobe should give you 110% of the highest bid you get for any 0-day. They could have fixed these a long time ago if they'd paid the discoverer $45k (or $150k -- times three for exclusivity.) These companies are effectively outsourcing security testing and remediation of their software, then whinging that independent developers don't work for free.


> Why don't you 100% blame the people at fault: Adobe / the original developers.

I agree Adobe is at fault for producing insecure software.

Blame is not a limited resource, there is always extra blame to go around. If I am driving recklessly and my brakes fail due to a manufacturing error, both I and the car company are at fault for the accident. One can always, as HT has done, make a bad situation worse but behaving in a reckless and unethical matter.

>Adobe should give you 110% of the highest bid you get for any 0-day.

This! This so hard.


Bug bounties are sensible, but price-matching seems too easy to game. How can the company know a bid is serious, and not just fake to be matched? "Oh, sure, so-and-so offered $200k for this bug."

(For that matter, while reputation is certainly a thing, what stops a security researcher from selling the same 0-day to several different buyers, and then selling it to the company to fix? Do the typical contracts to sell 0-days involve continued payment based on the amount of time the bug remains unfixed?)


I'd care a lot more if Adobe, et al, weren't repeatedly screwing up. A couple million dollar bounties and forcing them to pay to internalize their negative externalities will help create the proper internal focus on shipping secure software. Reputation doesn't show up as a line-item.

And if a security dev resells, who cares? The company still got the 0-day and still gets it fixed asap. It's far better than our current situation where these can persist for years.


> what stops a security researcher from selling the same 0-day to several different buyers, and then selling it to the company to fix?

People willing to pay 5 or 6-digit sums for a zero-day are likely... not nice. One wouldn't double-cross them willy-nilly. Multiple-sale to multiple third-parties scenarios are likely happening every day, but selling to developers could be considered an act of sabotage against all buyers, so there is no incentive really.


How about an escrow contract using a third party and bitcoin? You could call it silk road 3 Its really not that hard to be taken for a ride if you have the resource adobe does.


If you know a company is legally obligated to pay up to $x, and that they have $x, you can offer to pay $x/1.1 in collusion/partnership with the bug-seller, for a share of the proceeds. You can outlaw the collusion, but setting up this kind of mechanic seems like a bad idea.


1. Yes.

2. If one is the kind of person that thinks that the answer to 1 is no then probably the answer to 2 is no too (sorry if this sounds harsh).

3. Probably an effort proportional to the competitive advantage it gives to you.


Why not an effort proportional to the damage to affected parties if such an exploit were to be stolen?


OK, point taken. But they had them in the lab, did not safeguard them properly (by demonstration), and deserve a shit ton of blame and scorn.



My Macbook kernel panics and force-reboots itself because of a bug in some newer Firefox browser feature(s) which are used by a JS-based GBA emulator which was trending on HN yesterday. I can consistently duplicate the kernel panic by resizing the browser window while the emulator is running. I've never in my life experienced such a catastrophic bug from a Flash demo.

At worst, such a devastating bug has a decent chance of harboring its own RCE which has yet to be discovered or disclosed; at best, it's one of the most extreme local DOS attacks that a webpage could possibly launch against a client.

Just because it's much more trendy to bash Adobe than it is to bash Firefox doesn't mean that Firefox's problems are nonexistent.

Firefox RCE found on January 20, 2015: https://community.rapid7.com/community/metasploit/blog/2015/...

Firefox RCE found on February 25, 2015: https://msisac.cisecurity.org/advisories/2015/2015-018.cfm

Firefox RCE found on March 1, 2015: https://www.mozilla.org/en-US/security/advisories/mfsa2015-3...

Firefox RCE found on April 22, 2015: https://msisac.cisecurity.org/advisories/2015/2015-046.cfm

etc.

Pot calling the kettle black.


I you are panicking the kernel, that is a kernel bug, not a JS/Firefox bug.


guess it's time to disable flash for a few weeks...


A significant portion of the web using community (including myself) stopped using flash 6-12 months ago, when all the zero-days became a monthly occurrence. The plugin is no longer strategic for adobe, they've stopped any forward-looking development on it, and are now in the mode of whack-a-mole reactive security patching.

I have not once every missed having flash on my system. It's not just the case that the web is useable, it's that, with the single exception of the BBC, it doesn't seem to use it anywhere I visit.


The BBC site will use non-flash videos if you browse it on an iPad, but they don't seem smart enough to serve these to you if you use a desktop browser with flash disabled.

Presumably they could implement a non-flash fallback for users but unfortunately they just haven't bothered.

I tried to cheat by modifying my User-Agent to pretend to be an iPad but had no luck...


I was going to agree with you, but I've just double-checked, and you CAN access video content on the BBC sites on a desktop (MacOS X Safari) by setting your User-Agent to iPad. However, it's important that you've removed Flash completely from your system (using Flash Uninstaller), rather than just disable Flash (hoping to use Click-To-Flash). For some reason, they detect Flash by some kind of file-path-detection code...


That's irritating! I'll have to take a closer look at what they are doing, as I'd like to keep flash around on a click-to-run basis.

I'm surprised that websites can do any kind of file path detection on a client...


What horrible browser lets a website inspect the filesystem without permission?


Browsers give away far too much information: https://panopticlick.eff.org/


>A significant portion of the web using community (including myself) stopped using flash 6-12 months ago

That seems unlikely. Maybe HN users, but that's not really representative of web users overall


I'm on some troubleshooting pages for canon that require flash. Seems they are in the process- as there are html 5 vids on the site as well.


> The plugin is no longer strategic for adobe, they've stopped any forward-looking development on it, and are now in the mode of whack-a-mole reactive security patching.

[citation needed]


About four years back Adobe committed to HTML5 on mobile platforms, and noted they would only provide bug fixes and security patches.

http://www.cbsnews.com/news/adobe-abandons-flash-player-on-m...

http://www.telegraph.co.uk/technology/news/8879783/Adobe-aba...


Simply because at that time both Google and Apple have banned Flash on their respective platforms, otherwise nothing would change.


I'm not sure what your point is, but the reality on the ground, is that if you want to provide access to video, or other rich content, flash is incapable of reaching the largest audience, and the audience that's growing the fastest. Adobe has made it clear there will no longer be any development of flash on the mobile platform. HTML5 is the strategic platform for adobe moving forward.

Absolutely no new major content sites as of around 2014 or so support flash as an option - they are all starting with HTML5 and/or thick local clients.

Flash needs to be EOL'd, and the sooner the better for the security of the Internet.


Citation needed comments are lazy and useless.


I've been running without Flash for a couple of years now. The only thing I can't do that I would like to be able to do is to watch Facebook videos. Other than that, not having Flash installed is not a problem for me.


Facebook doesn't use HTML5? Why?!


They will if you force a mobile user agent. I wish I knew why they didn't on desktop.


Facebook now supports HTML5 video for Windows 7+.


Swap the "www" in the URL for "m" on a video page and you'll get a low resolution HTML5 video!


I just set it to only activate when I approve it, for if I'm on a trusted website.


No, it's time to uninstall all plugins for good.


For me there are generally 3 steps to the process of watching a youtube video.

1. Get the video id. Retrieve HTML containing youtube /watch?v= urls or other urls that contain the video id. Extract the urls from the HTML or other markup garbage.

2. Retrieve the video. Feed the /watch?v= url to a script that does some "find and replace" on the absurdly long googlevideo urls. Below I have given an example of such a script. Complaints welcome. It takes a /watch?v= url on stdin and retrieves the video in the format specified on the command line.

3. Play the video. ffmpeg libraries, mplayer, etc.

Whatever it is Flash does in the process of watching youtube videos (I am quite sure it is not step 3), I do not need it.

Thus even if by not using Flash or a complex "modern" web browser to watch youtube videos somehow were to reduce my exposure to vulnerabilities that routinely occur in such software, I would not care. Because the reason I do not use Flash is.... because I do not need it.

   # proof of concept: video retrieval
   
   # requirements:
   # sh, sed, tr, openssl, ftp
   
   # Adobe Flash not required
   # HTML5 not required
   # Python not required
   # Awk not required
   # web browser not required
   
   
   curl=ftp 
   file=1.mp4 # default outfile 
   url=www.youtube.com # example
   
   
   # itag #s are on the wikipedia page for youtube
   
   
   
   f061(){
   sed '
   s,%3D,=,g;
   s,%3A,:,g;
   s,%2F,/,g;
   s,%3F,?,g;
   s/
//g; ' }

   f060(){
   sed -e '
   s/&itag=5//;t1
   s/&itag=1[78]//;t1
   s/&itag=22//;t1
   s/&itag=3[4-8]//;t1
   s/&itag=4[3-6]//;t1
   s/&itag=1[346][0-9]//;t1
   ' -e :1
   }
   
   f062(){
   sed '
   s,http,\
   &,g' 
   }
   
   f063(){
   sed '
   /%3A%2F/!d;
   /videoplayback/!d' 
   }
   
   f064(){
   sed '
   s,%26,\
   ,g;
   s,&,\
   ,g;
   ' 
   }
   
   f065(){
   sed 's/&https/\
   \
   https/g;' 
   }
   
   f066(){
   sed 's/\\u0026.*//' 
   }
   
   f067(){
   sed '/itag='"${1-.}"'/!d;' 
   }
   
   f068(){
   sed 's/%25/%/g' 
   }
   
   
   f069(){
   tr '\012' '&' 
   }
   
   f070(){
   sed 's/&$//'; echo 
   }
   
   f071(){
   local a061 a062 a063;
   while read a; do 
   case $a in 
   https://*)a061=${a#https://*/} ;; 
   http://*)a061=${a#http://*/} ;; 
   *)a061=${a#*/} ;; 
   esac; 
   a062=${a#*://}; 
   a063=${a062%%/*}; 
   printf "%b" "${1-GET} /${a061} HTTP/1.0\r\n" 
   printf "Host: ${a063}\r\n";
   printf "User-Agent: GoogleAnalytics 1.5.1\r\n";
   printf "Connection: Close\r\n";
   printf "\r\n";
   done;
   }
   
   f072(){
   openssl s_client -ign_eof -connect $1:${2-443} -verify 9 
   }
   
   
   
   
   
   
   
   case $# in
   [12])
   {
   f071 \
   |f072 $url \
   |f062 \
   |f063 \
   |f061 \
   |f060 \
   |f064 \
   |f068 \
   |f069 \
   |f070
   } \
   |f061 \
   |f065 \
   |f066 \
   |f067 $1 \
   |{ 
   read a;
   exec $curl -4o ${2-$file} $a ;
   }
   
    ;;
   *)
   exec echo \
   "usage:   $0 itagno [outfile]
   outfile: $file"
   esac


Why are your functions named with numbers and why aren’t you using youtube-dl (https://rg3.github.io/youtube-dl/)?


If you're on windows SVP has a youtube extension that does this and plays it at 60fps :)

https://www.indiegogo.com/projects/real-time-video-frame-rat...


holy crap that is convoluted

I simply use mplayer and javascript oneliner extracting direct mp4 link from YouTubeCenter plugin = streaming video in mplayer without downloading.


Q: "... why aren't you using youtube-dl?"

A: "holy crap that is convuluted"

I do not use Python nor a Javascript-enabled web browser to download video.

Both are big, convoluted, slow(!) and unnecessary.

But I do agree with using mplayer for playback.


does Chrome and Firefox automatically update the Flash? I can't turn it off because...well lot of video sites made for men that are not Youtube or Twitch but more popular than Vimeo ever will be, requires flash.


Google Chrome - yes, it has Flash built-in.

Firefox - "no", it doesn't have Flash built-in but uses Flash installed in the operating system. However, Flash installed separately for example in Windows/OS X also updates itself.

However, you are screwed either way: always running the latest Flash player version which is known to be constantly full of security bugs, just like in the past 3 years... :)


Use youtube-dl, or mpv with youtube-dl. It can fetch videos from many adult sites without using flash.


What? I mean, how is this news?


What is news?


Isn't the record of infinite vulnerabilities in Flash widely known by everybody?


So if it is so widely known, why no action was taken by anyone to stop them from undermining Internets security?

Also not everyone knows how bad Flash is for their security, only few geeks care about reading cve-s. So until it goes to mainstream media not enough people will care.


Apple dropped it and it was a large, if not the largest, reason for work on sandboxing plugins.


IE: 491 code exploit vulnerabilities

Flash: 382 code exploit vulnerabilities.

Looks like Flash has a way to go.


um, no?



0-day exploits? I though that flash had been discontinued years ago.

The last release I've found is 11.2, which seems to be years old and the last ever.



Huh, I hadn't researched this before, but it looks like flash for Linux has been frozen for years, while the windows and OS X releases keep getting updates.

So I guess Linux users are immute to this new zero-day?


What are the people doing now who formerly developed Flash? Are they all diesel mechanics and baristas or what? I wouldn't even considering calling back a candidate why had Macromedia on their work history.


> I wouldn't even considering calling back a candidate why had Macromedia on their work history.

And I wouldn't even sort of consider hiring or even working with anyone that thinks work experience in a language makes them a liability.


Flash is decades old, not that big, and still has use-after-free vulnerabilities? Tools for catching those have been widely available for years. That makes one suspect those vulnerabilities aren't there by accident.

We need public disclosure of the code check-in that created the bug, with names. People need to be fired for this.


Work on a massive decades old software project and get ready to have your eyes opened. All the automated static and dynamic software analyzers catch only the easiest flaws, but can catch the more serious ones only if you're skilled and lucky.

Firing people for software bugs is the stupidest thing I've heard in a while. Everyone writes horrific software flaws. Everyone. The best of the best programmers just write less of them. Firing people for bugs is a job perk that will only motivate any good developers to find a less stupid employer as soon as possible.


All the automated static and dynamic software analyzers catch only the easiest flaws

In a 64-bit environment, at least for development purposes, why can't every single malloc() cause an allocation from new memory page(s)? Then free() removes the page(s) from accessible virtual memory.

Too much overhead for production, but it would sure catch a lot of use-after-free bugs during development. Is nobody doing something like that, or is that part of what you consider "the easiest flaws"?


Wait, you mean like _CRTDBG_DELAY_FREE_MEM_DF which will just mark freed blocks as freed and inaccessible? https://msdn.microsoft.com/en-us/library/5at7yxcs.aspx


It's been a while but I'm pretty sure the issues here only happen in extremely contrived edge cases. Not to say they aren't big deals or to downplay them, but I don't think even that would catch them reliably. Not without extremely heavy fuzzing or something.


Flash is big - video, audio, animation, browser hooks, filesystem access, etc. - and while Flash has been around for decades the code in the current iteration mostly hasn't been.


Being big is not an excuse for being terrible at security. If they can't secure a big thing, then maybe they should stop building them so big?


They have stopped building Flash.


People need to be fired for this

This comment was heavily voted down a day or so ago (not by me, I voted it up). But just now I'm reading about yet another zero-day, this time against Java.

So the question is, when are we going to get disgusted, sick and tired of all this sloppy code? When will "heads will roll for this" revert to being a meaningful punishment instead of just a historic cliche?

Enough is enough! If there are no consequences there will be no improvement.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: