
SonicWALL UTM Research team found reports of new 0-day vulnerability (CVE-2009-1862) in Adobe Flash player v9 and v10 being exploited in the wild via malicious drive-by sites.
The exploit is being actively served in the wild via following URL that is found to be injected into pages of infected websites:
The above page will only load with a valid referrer field containing the URL of one of the infected pages. The active server page contains script to identify user's browser environment and based on that loads one of the following pages:
The code snippet can be seen below:
In the first two cases, ff.html and ie.html contains JavaScript to download and run malicious Shockwave flash file that exploits 0-day vulnerability in Adobe Flash player:
It also downloads XORed Backdoor Trojan executable file from following URL:
Screenshot of 0-day exploit in action causing the flash player object and browser to crash can be seen below:
In the third case, mpg.html page contains JavaScript that further checks for the presence of specific host AntiVirus software from Kaspersky and McAfee. If the AntiVirus software is not present then it tries to exploit Microsoft DirectShow Msvidctl vulnerability.
The code snippet for AntiVirus presence detection can be seen below:
SonicWALL Gateway AntiVirus provides protection against this threat via GAV: Pidief (Exploit), GAV: Pidief_2 (Exploit), GAV: Pidief_3 (Exploit) and GAV: Agent.ROX (Trojan) signatures.
Share This Article

An Article By
An Article By
Security News
Security News