Thursday, January 27, 2022

Adobe shows off Sandboxed Flash Player

Adobe has just recently released the beta version of their sandboxed Flash Player, in hopes for fewer exploits.

“The design of this sandbox is similar to what Adobe delivered with Adobe Reader X Protected Mode and follows the same Practical Windows Sandboxing approach,” said Peleus Uhley, platform security strategist at Adobe, in a blog post on Monday. “Like the Adobe Reader X sandbox, Flash Player will establish a low integrity, highly restricted process that must communicate through a broker to limit its privileged activities.”

What sandboxing does, is it creates a virtual chunk of memory that is used to isolate the program from your hard drive. Therefore any programs running in this virtual memory cannot touch your system.

Adobe chose to apply sandboxing in Adobe Reader back in 2010 to counter the multitude of exploits that aimed the product and its users. The engineering was assembled into Adobe Reader X (10.0) and is based on the same sandboxing precepts that Google applied when developing their Chrome browser.

Vital Flash Player vulnerabilities have regularly been exploited to taint computers with malware during the preceding several years. Along with Java, browser exploits and Adobe Reader, Flash Player is among the most attacked software package applications, because its vulnerabilities can commonly be exploited by merely visiting a malevolent website.

About FastFlux

Owner of ZeroSecurity, interested in programming, malware analysis and penetration testing. If you would like to write for the ZeroSecurity team, please use the contact form above.

Check Also

Amazon hacked – hacker leaks 80,000 login credentials

A hacker going by the name 0x2Taylor has said to have breached the servers of …