(Red Hat Issues Fix) Adobe Flash Player Memory Corruption Errors Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID: 1023308|
SecurityTracker URL: http://securitytracker.com/id/1023308
CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800
(Links to External Site)
Date: Dec 9 2009
Disclosure of user information, Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 10.0.32.18 and prior versions|
Several vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information.|
A remote user can create a specially crafted JPEG file that, when loaded by the target user, will execute arbitrary code on the target system [CVE-2009-3794]. The code will run with the privileges of the target user.
A remote user can create Flash content that, when loaded by the target user, will execute arbitrary code on the target system [CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, and CVE-2009-3800].
A remote user can access file names on target systems running Windows by exploiting the Flash Player ActiveX control [CVE-2009-3951].
Flash Professional CS3 and CS4 are also affected.
Jim Cheng of EffectiveUI, Bing Liu of Fortinet's FortiGuard Labs, an anonymous researcher via TippingPoint, Damian Put via TippingPoint, Will Dormann of CERT, and Manuel Caballero and Microsoft Vulnerability Research (MSVR) reported these vulnerabilities.
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.|
A remote user can obtain potentially sensitive information.
Red Hat has issued a fix.|
The Red Hat advisory is available at:
Vendor URL: www.adobe.com/support/security/bulletins/apsb09-19.html (Links to External Site)
Access control error|
|Underlying OS: Linux (Red Hat Enterprise)|
|Underlying OS Comments: 5|
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Subject: [RHSA-2009:1657-01] Critical: flash-plugin security update|
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2009:1657-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1657.html
Issue date: 2009-12-09
CVE Names: CVE-2009-3794 CVE-2009-3796 CVE-2009-3797
CVE-2009-3798 CVE-2009-3799 CVE-2009-3800
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
RHEL Desktop Supplementary (v. 5 client) - i386, x86_64
RHEL Supplementary (v. 5 server) - i386, x86_64
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.
Multiple security flaws were found in the way Flash Player displayed
certain SWF content. An attacker could use these flaws to create a
specially-crafted SWF file that would cause flash-plugin to crash or,
possibly, execute arbitrary code when the victim loaded a page containing
the specially-crafted SWF content. (CVE-2009-3794, CVE-2009-3796,
CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 10.0.42.34.
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
5. Bugs fixed (http://bugzilla.redhat.com/):
543857 - flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800)
6. Package List:
RHEL Desktop Supplementary (v. 5 client):
RHEL Supplementary (v. 5 server):
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
The Red Hat security contact is <firstname.lastname@example.org>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
-----END PGP SIGNATURE-----
Enterprise-watch-list mailing list