Guest Editorial by Dino Dai Zovi
We must be careful, however, to make sure that the real lesson isn’t lost while we all breathe a collective sigh of relief: the vulnerability may as well have been zero-day.
Google Analytics has a nifty feature where it will give you information on your visitor’s browser capabilities, including the version of Flash installed down to the revision level [1]. I was looking through the analytics for my other, more neglected web site and noticed that less than a third of my high-technical visitors had a current version of Flash. An anonymous robot contributed statistics for a larger site that had significantly more visitors [2] and the statistics confirmed the low percentage of up-to-date Flash players.
Date | % up-to-date |
5/26 | 15.28 |
5/27 | 15.93 |
5/28 | 16.50 |
5/29 | 17.51 |
How does the average user know that they should update Flash and how to do so? By reading the trade press? Microsoft learned that you have to harass the user into patching their operating system and even then, it should be as automatic as
possible. As Flash currently enjoys an essentially universal market share, now is the time to make significant security improvements without having to repeat the lessons that others have had to so painfully learn.
[2] Data is based on several hundred thousand unique visitors.
* Dino Dai Zovi is an information security professional, researcher, and author. He is perhaps best known in the security and Mac communities for discovering the vulnerability and writing the exploit to win the first PWN2OWN contest at CanSecWest 2007. He publishes the Trail of Bits blog and can also be found on Twitter.