Home / vulnerabilitiesPDF  

TA09-343A.txt

Posted on 10 December 2009
Source : packetstormsecurity.org Link

 


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


National Cyber Alert System

Technical Cyber Security Alert TA09-343A


Adobe Flash Vulnerabilities Affect Flash Player and Adobe AIR

Original release date:
Last revised: --
Source: US-CERT


Systems Affected

* Adobe Flash Player 10.0.32.18 and earlier versions
* Adobe AIR 1.5.2 and earlier versions


Overview

Adobe has released Security Bulletin APSB09-19, which describes
vulnerabilities affecting Adobe Flash Player and Adobe AIR.


I. Description

Adobe Security Bulletin APSB09-19 describes vulnerabilities
affecting Adobe Flash Player and Adobe AIR. Flash Player version
10.0.32.18 and earlier versions as well as Adobe AIR versions 1.5.2
and earlier are affected.

An attacker could exploit this vulnerability by convincing a user
to visit a website that hosts a specially crafted SWF file. The
Adobe Flash browser plugin is available for multiple web browsers
and operating systems, any of which could be affected.


II. Impact

This vulnerability allows a remote attacker to execute arbitrary
code as the result of a user viewing a web page.


III. Solution

Users are encouraged to update Flash Player 10.0.32.18 and earlier
versions as well as Adobe AIR 1.5.2 and earlier versions to the
latest version.

These vulnerabilities can be mitigated by disabling the Flash
plugin or by using the NoScript extension for Mozilla Firefox or
SeaMonkey to whitelist websites that can access the Flash plugin.
For more information about securely configuring web browsers,
please see the Securing Your Web Browser document.


IV. References

* Adobe Security Bulletin APSB09-19 -
<http://www.adobe.com/support/security/bulletins/apsb09-19.html>

____________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA09-343A.html>
____________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA09-343A Feedback VU#392637" in
the subject.
____________________________________________________________________

For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________

Produced 2009 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html>
____________________________________________________________________

Revision History

December 09, 2009: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSx/yqtucaIvSvh1ZAQIqGwf+Ne0xmfPFETwdMHKUWtGxkHEcwFSH7p5r
eG3hm+Crz/chctWpsXBBQPzDtOMkNwLfkNq+/CatxY0MAl+2GCxCo2hhtznfTM5H
dYjw3Yu/Kj0lFfB6sfOJDVG42G8Etq6/b7IfSjt4eq2tUNAEhMlAwY/YXRMq9J1L
QCiu0MksEUJnmCeUmyU85xJSHhBTZpQ1O6628WjMWjAioOUFXFJw6WO0xlwqHbx3
EVk+budrlmHdW9IuhGvlfvGw9gqsbb8brR/dKe8HIwFcicYwMXuYN21+qPMlY806
AC7PbrTHaZN8DqgU9RV39aHDNE9oOmsassMQsNEVwaPAA45lGvH4qQ==
=+S2G
-----END PGP SIGNATURE-----

 

TOP

Malware :