Google says sandboxing is now available for Flash â€œwith this releaseâ€ of Chrome. The most recent version, Chrome 23, arrived last week, which is when the four-year-old browser received its usual dose of security fixes (14 in total), as well as a new version of Adobe Flash.
Yet the company today wanted to underline today that Chromeâ€™s built-in Flash Player on Mac now uses a new plug-in architecture which runs Flash inside a sandbox thatâ€™s as strong as Chromeâ€™s native sandbox, and â€œmuch more robust than anything else available.â€ This is great news for Mac users since Flash is so very widely used, and thus is a huge target for cybercriminals pushing malware.
Malware writers love exploiting Flash for the same reasons as they do Java: itâ€™s a cross-platform plugin. Such an attack vector allows them to target more than one operating system, more than one browser, and thus more than one type of user. What Google is doing here is minimizing the chances that its users, namely those using Chrome, will get infected by such threats.
The truth is that not everyone gets updates to chrome as soon as its released. And as its usually the case a lot of holes get discovered only after its exploited in the field. Google has finally announced a fully sandboxed flash engine which prevents the malicious code running within the flash component to fully exploit the system. It should keep you safe from unexpected security threats until an update arrives.