Zero-day vulnerability in Adobe Flash, CVE-2015-0313

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Zero-day vulnerability in Adobe Flash, CVE-2015-0313

Retired Member
Not applicable

Vulnerability Coverage:

Wildfire AV - WF 52532 (today) (PAN-OS 5.0+), and AV 1478 (tomorrow). Virus/Win32.CVE-2015-0313.a

IPS Signature- Planning to release with 2/3 IPS signature release

URLs associated with Malicious SWF samples:

Malicious domains added to PAN-DB/malware already (PAN-OS 5.0 +)

CnC/Spyware:

Malicious DNS signatures added for domains associated with malicious samples (PAN-OS 5.0+)

WildFire:

Forward SWF flash files to Wildfire for analysis.

Traps Advanced Endpoint Protection:

Traps was able to mitigate the last zero-day vulnerability.  Palo Alto Networks has not confirmed this yet.

http://researchcenter.paloaltonetworks.com/2015/01/unpatched-flash-vulnerability-cve-2015-0311-block...

Other mitigations:

Investigate removing Adobe Flash if not required. YouTube is now moving to html5 so more sites will continue to follow.

https://helpx.adobe.com/security/products/flash-player/apsa15-02.html

1 REPLY 1

L7 Applicator

Vuln Protection was added with Apps+Threats Content package 484

On Release Notes, New Vulnerability Signature:

Threat ID 37364

Adobe Flash Player Memory Corruption Vulnerability

CVE-2015-0313

Screen Shot 2015-02-05 at 12.05.05 PM.png

  • 1686 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!