SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Adobe Flash Player Vendors:   Adobe Systems Incorporated
(Red Hat Issues Fix) Adobe Flash Player Multiple Flaws Let Remote Users Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Obtain Elevated Privileges
SecurityTracker Alert ID:  1041492
SecurityTracker URL:  http://securitytracker.com/id/1041492
CVE Reference:   CVE-2018-12824, CVE-2018-12825, CVE-2018-12826, CVE-2018-12827, CVE-2018-12828   (Links to External Site)
Date:  Aug 15 2018
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can gain elevated privileges. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system.

A remote user can trigger an out-of-bounds memory read error to view potentially sensitive information on the target system [CVE-2018-12824, CVE-2018-12826, CVE-2018-12827].

A remote user can exploit a flaw in a component to gain elevated privileges on the target system [CVE-2018-12828].

A remote user can bypass security controls on the target system [CVE-2018-12825].

Anonymous (via Trend Micro's Zero Day Initiative), Chenming Xu and Dan Caselden, ICEBRG Gigamon, Dor Hadad of Palo Alto Networks, Kai Song from TenCent, and Mateusz Jurczyk and NatalieSilvanovichof Google Project Zero reported these vulnerabilities.

Impact:   A remote user can gain elevated privileges on the target system.

A remote user can bypass security controls on the target system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://access.redhat.com/errata/RHSA-2018:2435

Vendor URL:  access.redhat.com/errata/RHSA-2018:2435 (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Aug 14 2018 Adobe Flash Player Multiple Flaws Let Remote Users Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Obtain Elevated Privileges



 Source Message Contents

Subject:  [RHSA-2018:2435-01] Important: flash-plugin security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: flash-plugin security update
Advisory ID:       RHSA-2018:2435-01
Product:           Red Hat Enterprise Linux Supplementary
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:2435
Issue date:        2018-08-15
CVE Names:         CVE-2018-12824 CVE-2018-12825 CVE-2018-12826 
                   CVE-2018-12827 CVE-2018-12828 
=====================================================================

1. Summary:

An update for flash-plugin is now available for Red Hat Enterprise Linux 6
Supplementary.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64

3. Description:

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.

This update upgrades Flash Player to version 30.0.0.154.

Security Fix(es):

* flash-plugin: Information Disclosure vulnerabilities (APSB18-25)
(CVE-2018-12824, CVE-2018-12826, CVE-2018-12827)

* flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25)
(CVE-2018-12825)

* flash-plugin: Privilege Escalation vulnerability (APSB18-25)
(CVE-2018-12828)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1616026 - CVE-2018-12824 CVE-2018-12826 CVE-2018-12827 flash-plugin: Information Disclosure vulnerabilities (APSB18-25)
1616027 - CVE-2018-12828 flash-plugin: Privilege Escalation vulnerability (APSB18-25)
1616028 - CVE-2018-12825 flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25)

6. Package List:

Red Hat Enterprise Linux Desktop Supplementary (v. 6):

i386:
flash-plugin-30.0.0.154-1.el6_10.i686.rpm

x86_64:
flash-plugin-30.0.0.154-1.el6_10.i686.rpm

Red Hat Enterprise Linux Server Supplementary (v. 6):

i386:
flash-plugin-30.0.0.154-1.el6_10.i686.rpm

x86_64:
flash-plugin-30.0.0.154-1.el6_10.i686.rpm

Red Hat Enterprise Linux Workstation Supplementary (v. 6):

i386:
flash-plugin-30.0.0.154-1.el6_10.i686.rpm

x86_64:
flash-plugin-30.0.0.154-1.el6_10.i686.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-12824
https://access.redhat.com/security/cve/CVE-2018-12825
https://access.redhat.com/security/cve/CVE-2018-12826
https://access.redhat.com/security/cve/CVE-2018-12827
https://access.redhat.com/security/cve/CVE-2018-12828
https://access.redhat.com/security/updates/classification/#important
https://helpx.adobe.com/security/products/flash-player/apsb18-25.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=x2ph
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC