SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Multimedia)  >   Adobe Flash Vendors:   Adobe Systems Incorporated
(Red Hat Issues Advisory) Adobe Flash Player Flaws Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1025079
SecurityTracker URL:  http://securitytracker.com/id/1025079
CVE Reference:   CVE-2011-0558, CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0575, CVE-2011-0577, CVE-2011-0578, CVE-2011-0607, CVE-2011-0608   (Links to External Site)
Date:  Feb 15 2011
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.1.102.64 and prior; 10.1.106.16 and prior for Android
Description:   Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted Flash content that, when loaded by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Vitaliy Toropov (via iDefense), an Anonymous Researcher (via iDefense), Will Dormann of CERT, Bo Qu of Palo Alto Networks, Simon Raner of ACROS Security, Marc Schoenefeld of Red Hat Security Response Team, an anonymous reporter (via TippingPoint), and Tavis Ormandy of the Google Security Team reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   No solution was available at the time of this entry.

Red Hat has issued an end of life notice advisory for the Flash Player plugin.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2011-0259.html

Vendor URL:  www.adobe.com/support/security/bulletins/apsb11-02.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:   Linux (Red Hat Enterprise)

Message History:   This archive entry is a follow-up to the message listed below.
Feb 9 2011 Adobe Flash Player Flaws Lets Remote Users Execute Arbitrary Code



 Source Message Contents

Date:  Tue, 15 Feb 2011 14:42:23 -0500
Subject:  [RHSA-2011:0259-01] Critical: flash-plugin - 1-Month End Of Life Notice

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Critical: flash-plugin - 1-Month End Of Life Notice
Advisory ID:       RHSA-2011:0259-01
Product:           Red Hat Enterprise Linux Extras
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-0259.html
Issue date:        2011-02-15
=====================================================================

1. Summary:

The flash-plugin package on Red Hat Enterprise Linux 4 contains multiple
security flaws and should no longer be used. This is the 1-month
notification of Red Hat's plans to disable Adobe Flash Player 9 on Red Hat
Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having critical
security impact.

2. Relevant releases/architectures:

Red Hat Desktop version 4 Extras - i386
Red Hat Enterprise Linux AS version 4 Extras - i386
Red Hat Enterprise Linux ES version 4 Extras - i386
Red Hat Enterprise Linux WS version 4 Extras - i386

3. Description:

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.

Adobe Flash Player 9 is vulnerable to critical security flaws and should no
longer be used. A remote attacker could use these flaws to execute
arbitrary code with the privileges of the user running Flash Player 9.
(CVE-2011-0558, CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571,
CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0575, CVE-2011-0577,
CVE-2011-0578, CVE-2011-0607, CVE-2011-0608)

Adobe is no longer providing security updates for Adobe Flash Player 9, and
is not providing a replacement Flash Player version compatible with Red Hat
Enterprise Linux 4.

In one month Red Hat plans to release an update for the flash-plugin
package that will prevent it from functioning. User wishing to continue
using Flash Player 9, despite the vulnerabilities, can add the flash-plugin
package to the up2date skip list. Refer to the following Red Hat
Knowledgebase article for instructions on adding a package to the up2date
skip list: https://access.redhat.com/kb/docs/DOC-1639

4. Solution:

This erratum contains a flash-plugin package with an updated version number
to ensure the distribution of this notice; however, no changes have been
made to the package.

5. Bugs fixed (http://bugzilla.redhat.com/):

676226 - CVE-2011-0558 CVE-2011-0559 CVE-2011-0560 CVE-2011-0561 CVE-2011-0571 CVE-2011-0572 CVE-2011-0573 CVE-2011-0574 CVE-2011-0575 CVE-2011-0577 CVE-2011-0578 CVE-2011-0607 CVE-2011-0608 flash-plugin: multiple code execution flaws (APSB11-02)

6. Package List:

Red Hat Enterprise Linux AS version 4 Extras:

i386:
flash-plugin-9.0.289.0-2.el4.i386.rpm

Red Hat Desktop version 4 Extras:

i386:
flash-plugin-9.0.289.0-2.el4.i386.rpm

Red Hat Enterprise Linux ES version 4 Extras:

i386:
flash-plugin-9.0.289.0-2.el4.i386.rpm

Red Hat Enterprise Linux WS version 4 Extras:

i386:
flash-plugin-9.0.289.0-2.el4.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://access.redhat.com/security/updates/classification/#critical
http://kb2.adobe.com/cps/406/kb406791.html
https://access.redhat.com/kb/docs/DOC-1639

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFNWtYUXlSAg2UNWIIRAnV4AKC+tA+zJiAwrg7Zn5Cg6hK6sEgbuQCfUNNi
wSiCNZd0QstlfxKS93iSahU=
=rvsA
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC