Research > Zero-Day Tracker > 20130613
Adobe Flash Clickjacking Vulnerability
Due to the nature of how Flash is implemented in IE and Chrome, an exact fix date is difficult to state; this vulnerability was fixed roughly in mid-2013.
Adobe, Google (embedded Flash in Chrome)
Adobe Flash in Chrome and Internet Explorer
Adobe Flash in Chrome and Internet Explorer allows malicious websites to create transparent Flash objects which allow access to the camera and audio resources. Users may inadvertently click on transparent Flash objects, enabling resources that may expose sensitive information to attackers.
Attackers may add transparent layers to a website to force users to inadvertently click on UI elements that the user cannot see. This may allow the attacker to perform user-initiated actions, such as enabling a camera or microphone. If successfully exploited, an attacker may gain access to sensitive information.
Disable Flash in Chrome and Internet Explorer. Additionally, disable webcams or microphones when not in use.
19257 - Google Chrome Clickjacking Vulnerability (20130626) - UNIX/Linux
19416 - Google Chrome Clickjacking Vulnerability (20130626) - Windows
19417 - Google Chrome Clickjacking Vulnerability (20130626) - Mac OS X
19418 - Google Chrome Clickjacking Vulnerability (20130626) - ThinApp
2011-8-20 - Adobe releases Security Advisory
2013-6-13 - Egor Homakov releases proof of concept
Copyright ©1998-2011 eEye Digital Security
Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert@eEye.com for permission.
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.