VARIoT IoT vulnerabilities database
| VAR-201510-0333 | CVE-2015-6716 | Windows and Mac OS X Run on Adobe Reader and Acrobat of ANSendForFormDistribution In the method JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The ANSendForFormDistribution method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANSendForFormDistribution method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANSendForFormDistribution method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0334 | CVE-2015-6717 | Windows and Mac OS X Run on Adobe Reader and Acrobat of DynamicAnnotStore In the method JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The DynamicAnnotStore method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the DynamicAnnotStore method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the DynamicAnnotStore method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0097 | CVE-2015-5586 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-6683, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-6691, CVE-2015-7615, CVE-2015-7617, and CVE-2015-7621. This vulnerability CVE-2015-6683 , CVE-2015-6684 , CVE-2015-6687 , CVE-2015-6688 , CVE-2015-6689 , CVE-2015-6690 , CVE-2015-6691 , CVE-2015-7615 , CVE-2015-7617 ,and CVE-2015-7621 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Adobe Acrobat and Reader are prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A use-after-free vulnerability exists in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0096 | CVE-2015-5583 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to bypassing sandbox restrictions |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass intended sandbox restrictions and obtain sensitive PDF information by launching a print job on a remote printer, a different vulnerability than CVE-2015-6705, CVE-2015-6706, and CVE-2015-7624. This vulnerability CVE-2015-6705 , CVE-2015-6706 ,and CVE-2015-7624 Is a different vulnerability.An attacker can run a print job on a remote printer, bypassing sandbox restrictions and PDF Information may be obtained. This vulnerability allows local attackers to disclose arbitrary PDF files on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within Acrobat Reader printing. Adobe Reader and Acrobat are prone to multiple unspecified security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and gain access to sensitive information, which may aid in further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0098 | CVE-2015-5569 | Adobe Flash Player and Adobe AIR Vulnerability in |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 improperly implement the Flash broker API, which has unspecified impact and attack vectors.
Little is known about this issue or its effects at this time. We will update this BID as more information emerges. An attacker could exploit this vulnerability to take control of an affected device. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier versions.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0059 | CVE-2015-7634 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7633. This vulnerability CVE-2015-7625 , CVE-2015-7626 , CVE-2015-7627 , CVE-2015-7630 ,and CVE-2015-7633 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0058 | CVE-2015-7633 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7634. This vulnerability CVE-2015-7625 , CVE-2015-7626 , CVE-2015-7627 , CVE-2015-7630 ,and CVE-2015-7634 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0049 | CVE-2015-7624 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to access restrictions |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2015-5583, CVE-2015-6705, and CVE-2015-6706. This vulnerability CVE-2015-5583 , CVE-2015-6705 ,and CVE-2015-6706 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlAn attacker could bypass access restrictions and obtain important information. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0048 | CVE-2015-7623 | Windows and Mac OS X Run on Adobe Reader and Acrobat of ANAuthenticateResource In the method JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The ANAuthenticateResource method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, and CVE-2015-7620. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 ,and CVE-2015-7620 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANAuthenticateResource method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANAAuthenticateResource method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0047 | CVE-2015-7622 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6685, CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, and CVE-2015-6695. This vulnerability CVE-2015-6685 , CVE-2015-6686 , CVE-2015-6693 , CVE-2015-6694 , CVE-2015-6695 ,and CVE-2015-7650 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Adobe Acrobat and Reader are prone to multiple memory-corruption vulnerabilities.
Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0055 | CVE-2015-7630 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7633, and CVE-2015-7634. This vulnerability CVE-2015-7625 , CVE-2015-7626 , CVE-2015-7627 , CVE-2015-7633 ,and CVE-2015-7634 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0054 | CVE-2015-7629 | Adobe Flash TextFormat tabStops Use-After-Free Remote Code Execution Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextFormat object with a crafted tabStops property, a different vulnerability than CVE-2015-7631, CVE-2015-7643, and CVE-2015-7644. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the TextFormat objects. By manipulating the tabStops property of a TextFormat object, an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0057 | CVE-2015-7632 | Adobe Flash Player and Adobe AIR Vulnerable to buffer overflow |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Buffer overflow in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a Loader object with a crafted loaderBytes property. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the Loader object. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. Failed exploit attempts will likely cause a denial-of-service condition. A buffer overflow vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0045 | CVE-2015-7620 | Windows and Mac OS X Run on Adobe Reader and Acrobat of ANSendForBrowserReview In the method JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The ANSendForBrowserReview method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANSendForBrowserReview method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANSendForBrowserReview method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0044 | CVE-2015-7619 | Windows and Mac OS X Run on Adobe Reader and Acrobat of ANShareFile2 In the method JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The ANShareFile2 method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANShareFile2 method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANShareFile2 method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0043 | CVE-2015-7618 | Windows and Mac OS X Run on Adobe Reader and Acrobat of CBAutoConfigCommentRepository In the method JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The CBAutoConfigCommentRepository method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7616 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the CBAutoConfigCommentRepository method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the CBAutoConfigCommentRepository method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0052 | CVE-2015-7627 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634. This vulnerability CVE-2015-7625 , CVE-2015-7626 , CVE-2015-7630 , CVE-2015-7633 ,and CVE-2015-7634 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0042 | CVE-2015-7617 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code by leveraging improper EScript exception handling, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-6691, CVE-2015-7615, and CVE-2015-7621. This vulnerability CVE-2015-5586 , CVE-2015-6683 , CVE-2015-6684 , CVE-2015-6687 , CVE-2015-6688 , CVE-2015-6689 , CVE-2015-6690 , CVE-2015-6691 , CVE-2015-7615 ,and CVE-2015-7621 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlInappropriate EScript Arbitrary code may be executed by using the execution process. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the the EScript exception handlers. A specially crafted PDF document can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A use-after-free vulnerability exists in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0056 | CVE-2015-7631 | Adobe Flash Player and Adobe AIR Vulnerabilities in arbitrary code execution |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextLine object with a crafted validity property, a different vulnerability than CVE-2015-7629, CVE-2015-7643, and CVE-2015-7644. This vulnerability is CVE-2015-7629 , CVE-2015-7635 , CVE-2015-7636 , CVE-2015-7637 , CVE-2015-7638 , CVE-2015-7639 , CVE-2015-7640 , CVE-2015-7641 , CVE-2015-7642 , CVE-2015-7643 ,and CVE-2015-7644 This is a different vulnerability. Supplementary information : CWE Vulnerability types by CWE-416: Use-after-free ( Using freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlCrafted by attackers validity With properties TextLine Arbitrary code could be executed via the object. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the TextLine object. By manipulating the validity property of a TextLine object, an attacker can force a dangling pointer to be reused after it has been freed. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0041 | CVE-2015-7616 | Windows and Mac OS X Run on Adobe Reader and Acrobat of ANVerifyComments In the method JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The ANVerifyComments method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7614 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, JavaScript API Execution restrictions may be avoided. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the ANVerifyComments method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. A security vulnerability exists in the ANVerifyComments method of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier