SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Adobe Flash Player Vendors:   Adobe Systems Incorporated
(Red Hat Issues Advisory) Adobe Flash Player Flaws Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1025231
SecurityTracker URL:  http://securitytracker.com/id/1025231
CVE Reference:   CVE-2011-0558, CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0575, CVE-2011-0577, CVE-2011-0578, CVE-2011-0607, CVE-2011-0608   (Links to External Site)
Date:  Mar 21 2011
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.1.102.64 and prior; 10.1.106.16 and prior for Android
Description:   Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted Flash content that, when loaded by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Vitaliy Toropov (via iDefense), an Anonymous Researcher (via iDefense), Will Dormann of CERT, Bo Qu of Palo Alto Networks, Simon Raner of ACROS Security, Marc Schoenefeld of Red Hat Security Response Team, an anonymous reporter (via TippingPoint), and Tavis Ormandy of the Google Security Team reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   Red Hat has issued an end-of-life advisory, disabling Flash Player 9 for Red Hat Enterprise Linux 4 and warning of unpatched vulnerabilities in that version.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2011-0368.html

Vendor URL:  www.adobe.com/support/security/bulletins/apsb11-02.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  4

Message History:   This archive entry is a follow-up to the message listed below.
Feb 9 2011 Adobe Flash Player Flaws Lets Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [RHSA-2011:0368-01] Critical: flash-plugin - End Of Life

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Critical: flash-plugin - End Of Life
Advisory ID:       RHSA-2011:0368-01
Product:           Red Hat Enterprise Linux Extras
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-0368.html
Issue date:        2011-03-21
CVE Names:         CVE-2011-0558 CVE-2011-0559 CVE-2011-0560 
                   CVE-2011-0561 CVE-2011-0571 CVE-2011-0572 
                   CVE-2011-0573 CVE-2011-0574 CVE-2011-0575 
                   CVE-2011-0577 CVE-2011-0578 CVE-2011-0607 
                   CVE-2011-0608 
=====================================================================

1. Summary:

This update disables Adobe Flash Player 9 on Red Hat Enterprise Linux 4, as
it contains multiple security flaws and should no longer be used.

The Red Hat Security Response Team has rated this update as having critical
security impact.

2. Relevant releases/architectures:

Red Hat Desktop version 4 Extras - i386
Red Hat Enterprise Linux AS version 4 Extras - i386
Red Hat Enterprise Linux ES version 4 Extras - i386
Red Hat Enterprise Linux WS version 4 Extras - i386

3. Description:

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.

Adobe Flash Player 9 is vulnerable to critical security flaws and should no
longer be used. A remote attacker could use these flaws to execute
arbitrary code with the privileges of the user running Flash Player 9.
(CVE-2011-0558, CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571,
CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0575, CVE-2011-0577,
CVE-2011-0578, CVE-2011-0607, CVE-2011-0608)

Adobe is no longer providing security updates for Adobe Flash Player 9, and
is not providing a replacement Flash Player version compatible with Red Hat
Enterprise Linux 4.

This erratum disables Adobe Flash Player 9 to prevent it from functioning.
User wishing to continue using Flash Player 9, despite the vulnerabilities,
can add the flash-plugin package to the up2date skip list. Refer to the
following Red Hat Knowledgebase article for instructions on adding a
package to the up2date skip list:
https://access.redhat.com/kb/docs/DOC-1639

4. Solution:

This update disables the flash-plugin package due to its known security
vulnerabilities.

5. Bugs fixed (http://bugzilla.redhat.com/):

676226 - CVE-2011-0558 CVE-2011-0559 CVE-2011-0560 CVE-2011-0561 CVE-2011-0571 CVE-2011-0572 CVE-2011-0573 CVE-2011-0574 CVE-2011-0575 CVE-2011-0577 CVE-2011-0578 CVE-2011-0607 CVE-2011-0608 flash-plugin: multiple code execution flaws (APSB11-02)

6. Package List:

Red Hat Enterprise Linux AS version 4 Extras:

i386:
flash-plugin-9.0.289.0-3.el4.i386.rpm

Red Hat Desktop version 4 Extras:

i386:
flash-plugin-9.0.289.0-3.el4.i386.rpm

Red Hat Enterprise Linux ES version 4 Extras:

i386:
flash-plugin-9.0.289.0-3.el4.i386.rpm

Red Hat Enterprise Linux WS version 4 Extras:

i386:
flash-plugin-9.0.289.0-3.el4.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-0558.html
https://www.redhat.com/security/data/cve/CVE-2011-0559.html
https://www.redhat.com/security/data/cve/CVE-2011-0560.html
https://www.redhat.com/security/data/cve/CVE-2011-0561.html
https://www.redhat.com/security/data/cve/CVE-2011-0571.html
https://www.redhat.com/security/data/cve/CVE-2011-0572.html
https://www.redhat.com/security/data/cve/CVE-2011-0573.html
https://www.redhat.com/security/data/cve/CVE-2011-0574.html
https://www.redhat.com/security/data/cve/CVE-2011-0575.html
https://www.redhat.com/security/data/cve/CVE-2011-0577.html
https://www.redhat.com/security/data/cve/CVE-2011-0578.html
https://www.redhat.com/security/data/cve/CVE-2011-0607.html
https://www.redhat.com/security/data/cve/CVE-2011-0608.html
https://access.redhat.com/security/updates/classification/#critical
http://kb2.adobe.com/cps/406/kb406791.html 
https://access.redhat.com/kb/docs/DOC-1639

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFNh4yzXlSAg2UNWIIRAgTUAJ9NM0sg5xjXNhVZas+IV5mIeTMlFQCeLPJU
IFWKWpb5COIy5PQofYYj6kM=
=MYUn
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC