VARIoT IoT vulnerabilities database
| VAR-201604-0329 | CVE-2015-8679 | Huawei P8 and Mate S Smartphone software ION and Maxim_smartpa_dev Service disruption in drivers (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: 5.5 Severity: MEDIUM |
The Maxim_smartpa_dev driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230 and Mate S smartphones with software CRR-TL00 before CRR-TL00C01B160SP01, CRR-UL00 before CRR-UL00C00B160, and CRR-CL00 before CRR-CL00C92B161 allow attackers to cause a denial of service (system crash) via a crafted application, which triggers an invalid memory access. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. HuaweiSmartPhones is a smart phone from China Huawei. Huawei Smart Phones are prone to multiple local denial-of-service vulnerabilities. The Huawei P8 and Mate S are smartphones from the Chinese company Huawei. The following products and versions are affected: Huawei P8 using GRA-TL00C01B220 and earlier, GRA-CL00C92B220 and earlier, GRA-CL10C92B220 and earlier, GRA-UL00C00B220 and earlier, GRA-UL10C00B220 and earlier Huawei P8, using CRR-TL00C01B153SP01 and previous versions, CRR-UL00C00B153 and previous versions, CRR-CL00C92B153 and previous versions of Mate S
| VAR-201601-0722 | No CVE | Furuno Voyage Data Recorder (VDR) moduleserv firmware update utility fails to properly sanitize user-provided input |
CVSS V2: 10.0 CVSS V3: - Severity: High |
Provided by Furuno Electric Co., Ltd. Voyage Data Recorder (VDR) VR-3000/VR-3000S and VR-7000 Firmware update function moduleserv Does not properly validate user input, root A vulnerability exists that allows arbitrary commands to be executed with privileges. The product page of Furuno Electric Co., Ltd. VDR Is "Records all crucial data to identify the cause of maritime casualty as well as contribute to the future prevention of the catastrophe of any kind. ( All important data is recorded not only to identify the cause of maritime disasters but also to prevent any future disasters. )" It has been described as. Voyage Data Recorder (VDR) VR-3000/VR-3000S and VR-7000 Firmware update function moduleserv Is 10110/TCP Waiting for communication. moduleserv Does not properly validate user input, so attackers root Any command can be executed with authority. For more information IOActive Blog, Maritime Security: Hacking into a Voyage Data Recorder (VDR) Please confirm. Maritime Security: Hacking into a Voyage Data Recorder (VDR) http://blog.ioactive.com/2015/12/maritime-security-hacking-into-voyage.htmlBy an attacker with network access to the device, root An arbitrary command may be executed with authority. The vulnerability stems from the program's insufficient filtering of user-submitted input. Successful exploits will result in complete compromise of the affected system
| VAR-201601-0421 | CVE-2015-8306 | Huawei P8 HIFI Driver Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Buffer overflow in the HIFI driver in Huawei P8 phones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230 allows attackers to cause a denial of service (system crash) or execute arbitrary code via an unspecified parameter. HuaweiP8 is a smartphone product of China Huawei. HIFIdriver is one of the HIFI sound drivers. Huawei P8 Smart Phone is prone to a local privilege-escalation vulnerability.
Local attackers can exploit this issue to crash the system or escalate user privilege. The following versions are affected: Huawei P8 using software versions prior to GRA-TL00C01B230, versions prior to GRA-CL00C92B230, versions prior to GRA-CL10C92B230, versions prior to GRA-UL00C00B230, and versions prior to GRA-UL10C00B230
| VAR-201601-0491 | CVE-2015-6432 | Cisco IOS XR Resource Management Error Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Cisco IOS XR 4.2.0, 4.3.0, 5.0.0, 5.1.0, 5.2.0, 5.2.2, 5.2.4, 5.3.0, and 5.3.2 does not properly restrict the number of Path Computation Elements (PCEs) for OSPF LSA opaque area updates, which allows remote attackers to cause a denial of service (device reload) via a crafted update, aka Bug ID CSCuw83486. Vendors have confirmed this vulnerability Bug ID CSCuw83486 It is released as.Service disruption through crafted updates by third parties ( Device reload ) There is a possibility of being put into a state. Cisco IOSXR is a fully modular, distributed network operating system from Cisco's IOS software family. A security vulnerability exists in Cisco IOSXR that originated from the number of times the program did not correctly limit the PathComputationElements(PCEs)forOSPFLSAopaque domain update. Cisco IOS XR Software is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to restart the OSPF process, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCuw83486. The following releases are affected: Cisco IOS XR Release 4.2.0, Release 4.3.0, Release 5.0.0, Release 5.1.0, Release 5.2.0, Release 5.2.2, Release 5.2.4, Release 5.3.0, Release 5.3. 2 versions
| VAR-201604-0443 | CVE-2015-8304 | Huawei P7 Phone software integer overflow vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Integer overflow in Huawei P7 phones with software before P7-L07 V100R001C01B606 allows remote attackers to gain privileges via a crafted application with the system or camera permission. HuaweiSmartPhones7 is a smart phone from China Huawei. HuaweiSmartPhones7 has a local privilege escalation vulnerability. A local attacker can exploit this vulnerability to gain root privileges. The Huawei P7 is a smartphone from the Chinese company Huawei. An integer overflow vulnerability exists in the Huawei P7 that uses software versions earlier than P7-L07 V100R001C01B606
| VAR-201604-0445 | CVE-2015-8307 | Huawei P8 and Mate S Service disruption in graphics drivers for smartphone software (DoS) Vulnerabilities |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
The Graphics driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230, and Mate S smartphones with software CRR-TL00 before CRR-TL00C01B160SP01, CRR-UL00 before CRR-UL00C00B160, and CRR-CL00 before CRR-CL00C92B161 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application with the graphics permission, aka an "interface access control vulnerability," a different vulnerability than CVE-2015-8680. This vulnerability " Interface access control vulnerability " It is called. This vulnerability CVE-2015-8680 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. HuaweiP8 is a smart phone from China Huawei. HuaweiP8 has a security vulnerability that can be exploited by local attackers to increase privileges. Huawei P8 Smart Phone is prone to multiple local privilege-escalation vulnerabilities. The Huawei P8 and Mate S are smartphones from the Chinese company Huawei. Graphics driver is one of the graphics driver components. The following products and versions are affected: Huawei P8 using GRA-TL00C01B220 and earlier, GRA-CL00C92B220 and earlier, GRA-CL10C92B220 and earlier, GRA-UL00C00B220 and earlier, GRA-UL10C00B220 and earlier Huawei P8, using CRR-TL00C01B153SP01 and previous versions, CRR-UL00C00B153 and previous versions, CRR-CL00C92B153 and previous versions of Mate S
| VAR-201604-0446 | CVE-2015-8318 | Huawei P8 and Mate S Smartphone software HIFI Driver heap-based buffer overflow vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Heap-based buffer overflow in the HIFI driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230, and Mate S smartphones with software CRR-TL00 before CRR-TL00C01B160SP01, CRR-UL00 before CRR-UL00C00B160, and CRR-CL00 before CRR-CL00C92B161 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2015-8319. This vulnerability CVE-2015-8319 Is a different vulnerability.Denial of service operations through a specially crafted application by an attacker ( System crash ) It may be put into a state or it may be authorized. HuaweiP8 is a smart phone from China Huawei. HuaweiP8 has a security vulnerability that can be exploited by local attackers to increase privileges. Huawei P8 Smart Phone is prone to multiple local privilege-escalation vulnerabilities. The Huawei P8 and Mate S are smartphones from the Chinese company Huawei. HIFI driver is one of the HIFI (High Fidelity) audio drivers. The following products and versions are affected: Huawei P8 using GRA-TL00C01B220 and earlier, GRA-CL00C92B220 and earlier, GRA-CL10C92B220 and earlier, GRA-UL00C00B220 and earlier, GRA-UL10C00B220 and earlier Huawei P8, using CRR-TL00C01B153SP01 and previous versions, CRR-UL00C00B153 and previous versions, CRR-CL00C92B153 and previous versions of Mate S
| VAR-201604-0447 | CVE-2015-8319 | Huawei P8 and Mate S Smartphone software HIFI Driver heap-based buffer overflow vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Heap-based buffer overflow in the HIFI driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230, and Mate S smartphones with software CRR-TL00 before CRR-TL00C01B160SP01, CRR-UL00 before CRR-UL00C00B160, and CRR-CL00 before CRR-CL00C92B161 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2015-8318. This vulnerability CVE-2015-8318 Is a different vulnerability.Denial of service operations through a specially crafted application by an attacker ( System crash ) It may be put into a state or it may be authorized. HuaweiP8 is a smart phone from China Huawei. HuaweiP8 has a security vulnerability that can be exploited by local attackers to increase privileges. Huawei P8 Smart Phone is prone to multiple local privilege-escalation vulnerabilities. The Huawei P8 and Mate S are smartphones from the Chinese company Huawei. HIFI driver is one of the HIFI (High Fidelity) audio drivers. The following products and versions are affected: Huawei P8 using GRA-TL00C01B220 and earlier, GRA-CL00C92B220 and earlier, GRA-CL10C92B220 and earlier, GRA-UL00C00B220 and earlier, GRA-UL10C00B220 and earlier Huawei P8, using CRR-TL00C01B153SP01 and previous versions, CRR-UL00C00B153 and previous versions, CRR-CL00C92B153 and previous versions of Mate S
| VAR-201604-0330 | CVE-2015-8680 | Huawei P8 and Mate S Service disruption in graphics drivers for smartphone software (DoS) Vulnerabilities |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
The Graphics driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230, and Mate S smartphones with software CRR-TL00 before CRR-TL00C01B160SP01, CRR-UL00 before CRR-UL00C00B160, and CRR-CL00 before CRR-CL00C92B161 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application with the graphics permission, aka an "interface access control vulnerability," a different vulnerability than CVE-2015-8307. This vulnerability " Interface access control vulnerability " It is called. This vulnerability CVE-2015-8307 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. HuaweiP8 is a smart phone from China Huawei. HuaweiP8 has a security vulnerability that can be exploited by local attackers to increase privileges. Huawei P8 Smart Phone is prone to multiple local privilege-escalation vulnerabilities. The Huawei P8 and Mate S are smartphones from the Chinese company Huawei. Graphics driver is one of the graphics driver components. The following products and versions are affected: Huawei P8 using GRA-TL00C01B220 and earlier, GRA-CL00C92B220 and earlier, GRA-CL10C92B220 and earlier, GRA-UL00C00B220 and earlier, GRA-UL10C00B220 and earlier Huawei P8, using CRR-TL00C01B153SP01 and previous versions, CRR-UL00C00B153 and previous versions, CRR-CL00C92B153 and previous versions of Mate S
| VAR-201604-0331 | CVE-2015-8681 | Huawei P8 and Mate S Smartphone software ovisp Service disruption in drivers (DoS) Vulnerabilities |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
The ovisp driver in Huawei P8 smartphones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230, and Mate S smartphones with software CRR-TL00 before CRR-TL00C01B160SP01, CRR-UL00 before CRR-UL00C00B160, and CRR-CL00 before CRR-CL00C92B161 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application with the camera permission, aka an "interface access control vulnerability.". This vulnerability " Interface access control vulnerability " It is called. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlAn attacker could disrupt service through a crafted application with camera privileges ( System crash ) It may be put into a state or it may be authorized. HuaweiP8 is a smart phone from China Huawei. A local attacker could exploit this vulnerability to increase privileges. Huawei P8 Smart Phone is prone to multiple local privilege-escalation vulnerabilities. The Huawei P8 and Mate S are smartphones from the Chinese company Huawei. The following products and versions are affected: Huawei P8 using GRA-TL00C01B220 and earlier, GRA-CL00C92B220 and earlier, GRA-CL10C92B220 and earlier, GRA-UL00C00B220 and earlier, GRA-UL10C00B220 and earlier Huawei P8, using CRR-TL00C01B153SP01 and previous versions, CRR-UL00C00B153 and previous versions, CRR-CL00C92B153 and previous versions of Mate S
| VAR-201604-0444 | CVE-2015-8305 | Huawei Sophia-L10 Service disruption in smartphone software (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: 5.5 Severity: MEDIUM |
Huawei Sophia-L10 smartphones with software before P7-L10C900B852 allow attackers to cause a denial of service (system panic) via a crafted application with the system or camera privilege. HuaweiSmartPhones7 is a smart phone from China Huawei. There is a security hole in HuaweiSmartPhones7. A local attacker could exploit this vulnerability to crash the system. Huawei Sophia-L10 is a smartphone from the Chinese company Huawei. A security vulnerability exists in the Huawei Sophia-L10 that uses software versions earlier than P7-L10C900B852
| VAR-201703-0219 | CVE-2015-8687 |
Alcatel-Lucent Motive Home Device Manager of Management Console Vulnerable to cross-site scripting
Related entries in the VARIoT exploits database: VAR-E-201601-0518 |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in the Management Console in Alcatel-Lucent Motive Home Device Manager (HDM) before 4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) deviceTypeID parameter to DeviceType/getDeviceType.do; the (2) policyActionClass or (3) policyActionName parameter to PolicyAction/findPolicyActions.do; the deviceID parameter to (4) SingleDeviceMgmt/getDevice.do or (5) device/editDevice.do; the operation parameter to (6) ajax.do or (7) xmlHttp.do; or the (8) policyAction, (9) policyClass, or (10) policyName parameter to policy/findPolicies.do. (1) DeviceType/getDeviceType.do of deviceTypeID Parameters (2) policyActionClass (3) PolicyAction/findPolicyActions.do of policyActionName Parameter or deviceID Parameters (4) SingleDeviceMgmt/getDevice.do (5) device/editDevice.do Operating parameters (6) ajax.do (7) xmlHttp.do (8) policyAction (9) policyClass (10) policy/findPolicies.do of policyName Parameters. Alcatel-LucentHomeDeviceManager is a device manager that helps manage and control home network devices through the help desk.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
10 Dec 2015 Vendor returned ; investigating
16 Dec 2015 Vendor has validated the issues & fixed
27 Dec 2015 CVE number assigned
03 Jan 2016 Disclosured
Affected Product(s):
====================
Alcatel Lucent Home Device Manager - Management Console 4.1.10.5
may be old version could be affected
Exploitation Technique:
=======================
Local, Authenticated
Severity Level:
===============
High
Technical Details & Description:
================================
Ø Sample Payload : 42f8b36<script>alert(1)<%2fscript>152b4
Ø Affected Path/Parameter: [10 parameter]
1. /hdm/DeviceType/getDeviceType.do [deviceTypeID parameter]
o
http://10.240.71.198:7003/hdm/DeviceType/getDeviceType.do?deviceTypeID=42f8b36
<script>alert(1)<%2fscript>152b4
2. /hdm/PolicyAction/findPolicyActions.do [policyActionClass parameter]
o
http://10.240.71.198:7003/hdm/PolicyAction/findPolicyActions.do?policyActionSearch=1&policyActionName=&policyActionClass=c9e31
"><script>alert(1)<%2fscript>3bd174ff207&policyActionFunction=0
3. /hdm/PolicyAction/findPolicyActions.do [policyActionName parameter]
o
http://10.240.71.198:7003/hdm/PolicyAction/findPolicyActions.do?policyActionSearch=1&policyActionName=553a3
"><script>alert(1)<%2fscript>721d335792b&policyActionClass=&policyActionFunction=0
4. /hdm/SingleDeviceMgmt/getDevice.do [deviceID parameter]
o
http://10.240.71.198:7003/hdm/SingleDeviceMgmt/getDevice.do?deviceID=8001a1a0b
<script>alert(1)<%2fscript>1a032
5. /hdm/ajax.do [operation parameter]
o http://10.240.71.198:7003/hdm/ajax.do?operation=getDeviceById0fa81
<script>alert(1)<%2fscript>238957ca4e0&deviceId=8001
6. /hdm/device/editDevice.do [deviceID parameter]
o http://10.240.71.198:7003/hdm/device/editDevice.do?deviceID=8001c94e5
<script>alert(1)<%2fscript>45f4a
7. /hdm/policy/findPolicies.do [policyAction parameter]
o
http://10.240.71.198:7003/hdm/policy/findPolicies.do?policySearch=1&policyName=&policyAction=19f01
"><script>alert(1)<%2fscript>b37ee8333eb&policyClass=&policyStatus=&trigger=trigger_all
8. /hdm/policy/findPolicies.do [policyClass parameter]
o
http://10.240.71.198:7003/hdm/policy/findPolicies.do?policySearch=1&policyName=&policyAction=&policyClass=c77cb
"><script>alert(1)<%2fscript>5ddc63ced2e&policyStatus=&trigger=trigger_all
9. /hdm/policy/findPolicies.do [policyName parameter]
o
http://10.240.71.198:7003/hdm/policy/findPolicies.do?policySearch=1&policyName=654dd
"><script>alert(1)<%2fscript>5b8329ee237&policyAction=&policyClass=&policyStatus=&trigger=trigger_all
10. /hdm/xmlHttp.do [operation parameter]
o
http://10.240.71.198:7003/hdm/xmlHttp.do?operation=getQueuedActionsd4b0c
<script>alert(1)<%2fscript>217f045ae1f&deviceID=8001
Proof of Concept (PoC):
=======================
POC Video;
https://drive.google.com/file/d/0B-LWHbwdK3P9Y3UyZnFmZjJqa1U/view?usp=sharing
Solution Fix & Patch:
====================
Fixed version of 4.2
Security Risk:
==============
The risk of the vulnerability above estimated as high.
Credits & Authors:
==================
Ugur Cihan Koc(@_uceka_)
Blog: www.uceka.com
| VAR-201512-0624 | No CVE | Cross-site Scripting Vulnerability in uCosminexus Portal Framework and Groupmax Collaboration |
CVSS V2: 3.5 CVSS V3: - Severity: Low |
A cross-site scripting vulnerability was found in uCosminexus Portal Framework and Groupmax Collaboration.Remote users can exploit a cross-site scripting vulnerability to execute malicious scripts.
| VAR-201512-0438 | CVE-2015-8460 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8636, and CVE-2015-8645. This vulnerability CVE-2015-8459 , CVE-2015-8636 ,and CVE-2015-8645 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
(CVE-2015-8459, CVE-2015-8460, CVE-2015-8634, CVE-2015-8635,
CVE-2015-8636, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640,
CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8644,
CVE-2015-8645, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648,
CVE-2015-8649, CVE-2015-8650, CVE-2015-8651)
All users of Adobe Flash Player should install this updated package,
which upgrades Flash Player to version 11.2.202.559.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0437 | CVE-2015-8459 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: 10.0 Severity: CRITICAL |
Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8460, CVE-2015-8636, and CVE-2015-8645. This vulnerability CVE-2015-8460 , CVE-2015-8636 ,and CVE-2015-8645 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
(CVE-2015-8459, CVE-2015-8460, CVE-2015-8634, CVE-2015-8635,
CVE-2015-8636, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640,
CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8644,
CVE-2015-8645, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648,
CVE-2015-8649, CVE-2015-8650, CVE-2015-8651)
All users of Adobe Flash Player should install this updated package,
which upgrades Flash Player to version 11.2.202.559.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0222 | CVE-2015-8650 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, and CVE-2015-8649. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8648 ,and CVE-2015-8649 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of LoadVars.decode. The issue lies in the failure to safely hold a reference to arguments during execution of the function. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0223 | CVE-2015-8651 | Adobe Flash Player and Adobe AIR Integer overflow vulnerability in |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Integer overflow in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors.
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0221 | CVE-2015-8649 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8648 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Object.hasOwnProperty. The issue lies in the failure to safely hold a reference to arguments during execution of the function. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0217 | CVE-2015-8645 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8460, and CVE-2015-8636. This vulnerability CVE-2015-8459 , CVE-2015-8460 ,and CVE-2015-8636 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
(CVE-2015-8459, CVE-2015-8460, CVE-2015-8634, CVE-2015-8635,
CVE-2015-8636, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640,
CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8644,
CVE-2015-8645, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648,
CVE-2015-8649, CVE-2015-8650, CVE-2015-8651)
All users of Adobe Flash Player should install this updated package,
which upgrades Flash Player to version 11.2.202.559.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0218 | CVE-2015-8646 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8647 , CVE-2015-8648 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5