Adobe Flash Player 9 Security Flash Player 9,0,124,0
Total Page:16
File Type:pdf, Size:1020Kb
® ® Adobe Flash Player WHITE PAPER Adobe Flash Player 9 Security Flash Player 9,0,124,0 July 2008 Copyright © 2006-2008 Adobe Systems Incorporated. All rights reserved. The information contained in this document represents the current view of Adobe on the issue discussed as of the date of publication. Because Adobe must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Adobe, and Adobe cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for information purposes only. ADOBE MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Adobe may have patents, patent applications, trademark, copyright or other intellectual property rights covering the subject matter of this document. Except as expressly provided in any written license agreement from Adobe, the furnishing of this document does not give you any license to these patents, trademarks, copyrights or other intellectual property. Adobe, the Adobe Logo, Adobe AIR, Macromedia, Flash, Flash Lite, and Flex are trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Adobe Systems Incorporated 345 Park Avenue San Jose, CA 95110 (408) 536-6000 Contents Introduction .................................................................................................................................................................. 1 About this document .............................................................................................................................................. 1 Intended audience ................................................................................................................................................. 1 About the Flash Player client runtime ................................................................................................................. 2 About security ........................................................................................................................................................ 2 Other sources of information............................................................................................................................... .. 3 The Flash Player security environment ...................................................................................................................... 4 Stakeholders .......................................................................................................................................................... 5 Administrative user (of a particular client computer) and the user institution .......................................... 5 User (of a particular computer and programs) ............................................................................................. 5 Website administrator .................................................................................................................................... 5 Author (of a Flash application) ...................................................................................................................... 5 Overview of permission controls ........................................................................................................................... 6 Sources for potential risk ...................................................................................................................................... 7 Innocent bugs.................................................................................................................................................. 7 Other stakeholders ......................................................................................................................................... 7 Internet providers........................................................................................................................................... 7 Flash Player security architecture ............................................................................................................................... 8 Basic sandbox security model ............................................................................................................................... 8 Domain of origin ............................................................................................................................................. 9 Default permissions ...................................................................................................................................... 10 Port blocking ................................................................................................................................................. 11 Accessing data in another sandbox .............................................................................................................. 11 Permissions for specific domains ........................................................................................................................ 12 Network files ................................................................................................................................................. 12 Local files ...................................................................................................................................................... 12 Interpreters and byte code .................................................................................................................................. 15 Background ................................................................................................................................................... 15 Flash Player and byte codes ......................................................................................................................... 16 Code isolation ............................................................................................................................................... 16 Disk, memory, and processor protections ........................................................................................................... 17 Disk storage protections ............................................................................................................................... 17 Memory usage protections and processor quotas ........................................................................................ 17 Permission controls ..................................................................................................................................................... 18 Administrative user controls ............................................................................................................................... 18 The mms.cfg file ............................................................................................................................................ 18 Global Flash Player Trust directory ............................................................................................................ 20 User controls ........................................................................................................................................................ 20 Settings Manager ......................................................................................................................................... 21 Settings UI and runtime dialog boxes ......................................................................................................... 23 User Flash Player Trust directory ............................................................................................................... 26 Website controls (policy files) .............................................................................................................................. 27 URL policy files ............................................................................................................................................ 27 URL meta-policies ........................................................................................................................................ 29 Header sending permissions ........................................................................................................................ 30 Socket policy files ......................................................................................................................................... 31 Socket meta-policies ..................................................................................................................................... 32 Policy file logging .......................................................................................................................................... 33 Developer controls ............................................................................................................................................... 33 Permission mechanisms ............................................................................................................................... 33 Security.allowDomain() ................................................................................................................................ 34 Security.loadPolicyFile() .............................................................................................................................