Home / mailingsPDF  

[RHSA-2009:1657-01] Critical: flash-plugin security update

Posted on 09 December 2009
RedHat

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2009:1657-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1657.html
Issue date: 2009-12-09
CVE Names: CVE-2009-3794 CVE-2009-3796 CVE-2009-3797
CVE-2009-3798 CVE-2009-3799 CVE-2009-3800
=====================================================================

1. Summary:

An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 Supplementary.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

RHEL Desktop Supplementary (v. 5 client) - i386, x86_64
RHEL Supplementary (v. 5 server) - i386, x86_64

3. Description:

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.

Multiple security flaws were found in the way Flash Player displayed
certain SWF content. An attacker could use these flaws to create a
specially-crafted SWF file that would cause flash-plugin to crash or,
possibly, execute arbitrary code when the victim loaded a page containing
the specially-crafted SWF content. (CVE-2009-3794, CVE-2009-3796,
CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800)

All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 10.0.42.34.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

543857 - flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800)

6. Package List:

RHEL Desktop Supplementary (v. 5 client):

i386:
flash-plugin-10.0.42.34-1.el5.i386.rpm

x86_64:
flash-plugin-10.0.42.34-1.el5.i386.rpm

RHEL Supplementary (v. 5 server):

i386:
flash-plugin-10.0.42.34-1.el5.i386.rpm

x86_64:
flash-plugin-10.0.42.34-1.el5.i386.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800
http://www.redhat.com/security/updates/classification/#critical
http://www.adobe.com/support/security/bulletins/apsb09-19.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.

 

TOP