VARIoT IoT vulnerabilities database
| VAR-201507-0543 | CVE-2015-4258 | Cisco TelePresence MSE 8000 Device Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence MSE 8000 devices allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90444. Vendors have confirmed this vulnerability Bug ID CSCuu90444 It is released as.A third party may be able to hijack the authentication of any user. Cisco TelePresence MSE 8000 devices is a high-capacity voice and video conferencing media service engine appliance.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCuu90444
| VAR-201507-0542 | CVE-2015-4257 | Cisco TelePresence MCU 4500 Device Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence MCU 4500 devices with software 4.5(1.55) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90710. Vendors have confirmed this vulnerability Bug ID CSCuu90710 It is released as.A third party may be able to hijack the authentication of any user. The Cisco TelePresence MCU 4500 is a multimedia conferencing bridge product.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCuu90710
| VAR-201507-0348 | CVE-2015-1793 | OpenSSL Vulnerabilities in certificate chain validation failure |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate. OpenSSL Contains a certificate chain validation flaw. 2015 Year 7 Moon 9 Day, OpenSSL Project Than OpenSSL Security Advisory [9 Jul 2015] Has been published. OpenSSL Security Advisory [9 Jul 2015] https://www.openssl.org/news/secadv_20150709.txt According to the advisory, the following vulnerabilities have been fixed: OpenSSL 1.0.2d , 1.0.1p Has been released. Severity − High (Severity: High) ・ Alternative chains certificate forgery (CVE-2015-1793) OpenSSL Tries to build an alternative certificate chain if the certificate validation fails to build the first certificate chain, but there is a flaw in the implementation of this process. As a result, for example CA Flag FALSE A certificate issued using a certificate that is considered to be trusted is not detected as being invalid. CA May be treated as a certificate issued by.Man-in-the-middle attacks (man-in-the-middle attack) By HTTPS The contents of the communication may be viewed or altered. OpenSSL is prone to a security-bypass vulnerability because the application fails to properly verify SSL, TLS, and DTLS certificates.
Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks and bypass certain security restrictions. This may aid in further attacks.
OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n, and 1.0.1o are vulnerable. It supports a variety of encryption algorithms, including symmetric ciphers, hash algorithms, security hashing algorithm, etc. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04760669
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04760669
Version: 1
HPSBUX03388 SSRT102180 rev.1 - HP-UX running OpenSSL, Remote Disclosure of
Information
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2015-08-05
Last Updated: 2015-08-05
Potential Security Impact: Remote disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP-UX running
OpenSSL with SSL/TLS enabled.
This is the TLS vulnerability using US export-grade 512-bit keys in
Diffie-Hellman key exchange known as Logjam which could be exploited remotely
resulting in disclosure of information.
References:
CVE-2015-4000: DHE man-in-the-middle protection (Logjam).
CVE-2015-1788: Malformed ECParameters causes infinite loop.
CVE-2015-1789: Exploitable out-of-bounds read in X509_cmp_time.
CVE-2015-1790: PKCS7 crash with missing EnvelopedContent
CVE-2015-1791: Race condition handling NewSessionTicket
CVE-2015-1792: CMS verify infinite loop with unknown hash function
CVE-2015-1793: Alternative Chain Certificate Forgery.
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
CVE-2015-1788 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
CVE-2015-1789 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
CVE-2015-1790 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2015-1791 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8
CVE-2015-1792 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2015-1793 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided an updated version of OpenSSL to resolve this vulnerability.
A new B.11.31 depot for OpenSSL_A.01.00.01p is available here:
https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber
=OPENSSL11I
MANUAL ACTIONS: Yes - Update
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HP and lists recommended actions that may apply to a specific HP-UX
system. It can also download patches and create a depot automatically. For
more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.31
==================
openssl.OPENSSL-CER
openssl.OPENSSL-CONF
openssl.OPENSSL-DOC
openssl.OPENSSL-INC
openssl.OPENSSL-LIB
openssl.OPENSSL-MAN
openssl.OPENSSL-MIS
openssl.OPENSSL-PRNG
openssl.OPENSSL-PVT
openssl.OPENSSL-RUN
openssl.OPENSSL-SRC
action: install revision A.01.00.01p or subsequent
END AFFECTED VERSIONS
HISTORY
Version:1 (rev.1) - 5 August 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAlXCSD4ACgkQ4B86/C0qfVlKnQCg5XcK1amrTACEyDY3QtJF75u2
L90AnAgGXxSCZgBVzDQCAezbHbrHPwtg
=74KM
-----END PGP SIGNATURE-----
.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/openssl-1.0.1p-i486-1_slack14.1.txz: Upgraded.
This update fixes the following security issue:
Alternative chains certificate forgery (CVE-2015-1793).
This issue will impact any application that verifies certificates including
SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David
Benjamin (Google/BoringSSL). The fix was developed by the BoringSSL project.
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-1.0.1p-i486-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/openssl-solibs-1.0.1p-i486-1_slack14.0.txz
Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-1.0.1p-x86_64-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/openssl-solibs-1.0.1p-x86_64-1_slack14.0.txz
Updated packages for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-1.0.1p-i486-1_slack14.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/openssl-solibs-1.0.1p-i486-1_slack14.1.txz
Updated packages for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-1.0.1p-x86_64-1_slack14.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/openssl-solibs-1.0.1p-x86_64-1_slack14.1.txz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.1p-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.1p-i586-1.txz
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.1p-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.1p-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 14.0 packages:
a77913257d9e4d9f0b143e7c2bf829d3 openssl-1.0.1p-i486-1_slack14.0.txz
9d778b2df5c01be05c5133d3c420a216 openssl-solibs-1.0.1p-i486-1_slack14.0.txz
Slackware x86_64 14.0 packages:
1423b29d8621434363fcd92480544d19 openssl-1.0.1p-x86_64-1_slack14.0.txz
e510fd37b65ab9b585f505c3b8925755 openssl-solibs-1.0.1p-x86_64-1_slack14.0.txz
Slackware 14.1 packages:
483c52a8f52243486db12c6a85e59ad3 openssl-1.0.1p-i486-1_slack14.1.txz
a2704397b9eabd509336dedfe1b51ff3 openssl-solibs-1.0.1p-i486-1_slack14.1.txz
Slackware x86_64 14.1 packages:
2a4b0b930a7513a24a719f9996c3cd5d openssl-1.0.1p-x86_64-1_slack14.1.txz
3414a0e114c93ac4352938f182df5180 openssl-solibs-1.0.1p-x86_64-1_slack14.1.txz
Slackware -current packages:
a867679d8f4a29a7b206930840d8c92f a/openssl-solibs-1.0.1p-i586-1.txz
1e28db3e77d547ef338c7116cf8d415f n/openssl-1.0.1p-i586-1.txz
Slackware x86_64 -current packages:
f53454dd43f9d3206db58b9cd8b4e53e a/openssl-solibs-1.0.1p-x86_64-1.txz
4433713b6723a0715dc60d1254ee2ca3 n/openssl-1.0.1p-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg openssl-1.0.1p-i486-1_slack14.1.txz openssl-solibs-1.0.1p-i486-1_slack14.1.txz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. The
vulnerabilities could be exploited remotely resulting in Denial of Service
(DoS) or unauthorized access.
References:
- CVE-2014-8176 - Remote Denial of Service (DoS)
- CVE-2015-1788 - Remote Denial of Service (DoS)
- CVE-2015-1789 - Remote Denial of Service (DoS)
- CVE-2015-1790 - Remote Denial of Service (DoS)
- CVE-2015-1791 - Remote Denial of Service (DoS)
- CVE-2015-1792 - Remote Denial of Service (DoS)
- CVE-2015-1793 - Remote Unauthorized Access
- PSRT110158, SSRT102264
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Please refer to the RESOLUTION
below for a list of impacted products.
**COMWARE 5 Products**
+ **A6600 (Comware 5) - Version: R3303P23**
* HP Network Products
- JC165A HP 6600 RPE-X1 Router Module
- JC177A HP 6608 Router
- JC177B HP 6608 Router Chassis
- JC178A HP 6604 Router Chassis
- JC178B HP 6604 Router Chassis
- JC496A HP 6616 Router Chassis
- JC566A HP 6600 RSE-X1 Router Main Processing Unit
- JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
- JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit
+ **HSR6602 (Comware 5) - Version: R3303P23**
* HP Network Products
- JC176A HP 6602 Router Chassis
- JG353A HP HSR6602-G Router
- JG354A HP HSR6602-XG Router
- JG355A HP 6600 MCP-X1 Router Main Processing Unit
- JG356A HP 6600 MCP-X2 Router Main Processing Unit
- JG776A HP HSR6602-G TAA-compliant Router
- JG777A HP HSR6602-XG TAA-compliant Router
- JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
+ **HSR6800 (Comware 5) - Version: R3303P23**
* HP Network Products
- JG361A HP HSR6802 Router Chassis
- JG361B HP HSR6802 Router Chassis
- JG362A HP HSR6804 Router Chassis
- JG362B HP HSR6804 Router Chassis
- JG363A HP HSR6808 Router Chassis
- JG363B HP HSR6808 Router Chassis
- JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
- JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
+ **MSR20 (Comware 5) - Version: R2514P10**
* HP Network Products
- JD432A HP A-MSR20-21 Router
- JD662A HP MSR20-20 Router
- JD663A HP A-MSR20-21 Router
- JD663B HP MSR20-21 Router
- JD664A HP MSR20-40 Router
- JF228A HP MSR20-40 Router
- JF283A HP MSR20-20 Router
+ **MSR20-1X (Comware 5) - Version: R2514P10**
* HP Network Products
- JD431A HP MSR20-10 Router
- JD667A HP MSR20-15 IW Multi-Service Router
- JD668A HP MSR20-13 Multi-Service Router
- JD669A HP MSR20-13 W Multi-Service Router
- JD670A HP MSR20-15 A Multi-Service Router
- JD671A HP MSR20-15 AW Multi-Service Router
- JD672A HP MSR20-15 I Multi-Service Router
- JD673A HP MSR20-11 Multi-Service Router
- JD674A HP MSR20-12 Multi-Service Router
- JD675A HP MSR20-12 W Multi-Service Router
- JD676A HP MSR20-12 T1 Multi-Service Router
- JF236A HP MSR20-15-I Router
- JF237A HP MSR20-15-A Router
- JF238A HP MSR20-15-I-W Router
- JF239A HP MSR20-11 Router
- JF240A HP MSR20-13 Router
- JF241A HP MSR20-12 Router
- JF806A HP MSR20-12-T Router
- JF807A HP MSR20-12-W Router
- JF808A HP MSR20-13-W Router
- JF809A HP MSR20-15-A-W Router
- JF817A HP MSR20-15 Router
- JG209A HP MSR20-12-T-W Router (NA)
- JG210A HP MSR20-13-W Router (NA)
+ **MSR 30 (Comware 5) - Version: R2514P10**
* HP Network Products
- JD654A HP MSR30-60 POE Multi-Service Router
- JD657A HP MSR30-40 Multi-Service Router
- JD658A HP MSR30-60 Multi-Service Router
- JD660A HP MSR30-20 POE Multi-Service Router
- JD661A HP MSR30-40 POE Multi-Service Router
- JD666A HP MSR30-20 Multi-Service Router
- JF229A HP MSR30-40 Router
- JF230A HP MSR30-60 Router
- JF232A HP RTMSR3040-AC-OVSAS-H3
- JF235A HP MSR30-20 DC Router
- JF284A HP MSR30-20 Router
- JF287A HP MSR30-40 DC Router
- JF801A HP MSR30-60 DC Router
- JF802A HP MSR30-20 PoE Router
- JF803A HP MSR30-40 PoE Router
- JF804A HP MSR30-60 PoE Router
- JG728A HP MSR30-20 TAA-compliant DC Router
- JG729A HP MSR30-20 TAA-compliant Router
+ **MSR 30-16 (Comware 5) - Version: R2514P10**
* HP Network Products
- JD659A HP MSR30-16 POE Multi-Service Router
- JD665A HP MSR30-16 Multi-Service Router
- JF233A HP MSR30-16 Router
- JF234A HP MSR30-16 PoE Router
+ **MSR 30-1X (Comware 5) - Version: R2514P10**
* HP Network Products
- JF800A HP MSR30-11 Router
- JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
- JG182A HP MSR30-11E Router
- JG183A HP MSR30-11F Router
- JG184A HP MSR30-10 DC Router
+ **MSR 50 (Comware 5) - Version: R2514P10**
* HP Network Products
- JD433A HP MSR50-40 Router
- JD653A HP MSR50 Processor Module
- JD655A HP MSR50-40 Multi-Service Router
- JD656A HP MSR50-60 Multi-Service Router
- JF231A HP MSR50-60 Router
- JF285A HP MSR50-40 DC Router
- JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
+ **MSR 50-G2 (Comware 5) - Version: R2514P10**
* HP Network Products
- JD429A HP MSR50 G2 Processor Module
- JD429B HP MSR50 G2 Processor Module
+ **MSR 9XX (Comware 5) - Version: R2514P10**
* HP Network Products
- JF812A HP MSR900 Router
- JF813A HP MSR920 Router
- JF814A HP MSR900-W Router
- JF815A HP MSR920 2FEWAN/8FELAN/.11 b/g Rtr
- JG207A HP MSR900-W Router (NA)
- JG208A HP MSR920-W Router (NA)
+ **MSR 93X (Comware 5) - Version: R2514P10**
* HP Network Products
- JG511A HP MSR930 Router
- JG511B HP MSR930 Router
- JG512A HP MSR930 Wireless Router
- JG513A HP MSR930 3G Router
- JG513B HP MSR930 3G Router
- JG514A HP MSR931 Router
- JG514B HP MSR931 Router
- JG515A HP MSR931 3G Router
- JG516A HP MSR933 Router
- JG517A HP MSR933 3G Router
- JG518A HP MSR935 Router
- JG518B HP MSR935 Router
- JG519A HP MSR935 Wireless Router
- JG520A HP MSR935 3G Router
- JG531A HP MSR931 Dual 3G Router
- JG531B HP MSR931 Dual 3G Router
- JG596A HP MSR930 4G LTE/3G CDMA Router
- JG597A HP MSR936 Wireless Router
- JG665A HP MSR930 4G LTE/3G WCDMA Global Router
- JG704A HP MSR930 4G LTE/3G WCDMA ATT Router
- JH009A HP MSR931 Serial (TI) Router
- JH010A HP MSR933 G.SHDSL (TI) Router
- JH011A HP MSR935 ADSL2+ (TI) Router
- JH012A HP MSR930 Wireless 802.11n (NA) Router
- JH012B HP MSR930 Wireless 802.11n (NA) Router
- JH013A HP MSR935 Wireless 802.11n (NA) Router
+ **MSR1000 (Comware 5) - Version: R2514P10**
* HP Network Products
- JG732A HP MSR1003-8 AC Router
+ **12500 (Comware 5) - Version: R1829P01**
* HP Network Products
- JC072B HP 12500 Main Processing Unit
- JC085A HP A12518 Switch Chassis
- JC086A HP A12508 Switch Chassis
- JC652A HP 12508 DC Switch Chassis
- JC653A HP 12518 DC Switch Chassis
- JC654A HP 12504 AC Switch Chassis
- JC655A HP 12504 DC Switch Chassis
- JC808A HP 12500 TAA Main Processing Unit
- JF430A HP A12518 Switch Chassis
- JF430B HP 12518 Switch Chassis
- JF430C HP 12518 AC Switch Chassis
- JF431A HP A12508 Switch Chassis
- JF431B HP 12508 Switch Chassis
- JF431C HP 12508 AC Switch Chassis
+ **9500E (Comware 5) - Version: R1829P01**
* HP Network Products
- JC124A HP A9508 Switch Chassis
- JC124B HP 9505 Switch Chassis
- JC125A HP A9512 Switch Chassis
- JC125B HP 9512 Switch Chassis
- JC474A HP A9508-V Switch Chassis
- JC474B HP 9508-V Switch Chassis
+ **10500 (Comware 5) - Version: R1210P01**
* HP Network Products
- JC611A HP 10508-V Switch Chassis
- JC612A HP 10508 Switch Chassis
- JC613A HP 10504 Switch Chassis
- JC614A HP 10500 Main Processing Unit
- JC748A HP 10512 Switch Chassis
- JG375A HP 10500 TAA-compliant Main Processing Unit
- JG820A HP 10504 TAA-compliant Switch Chassis
- JG821A HP 10508 TAA-compliant Switch Chassis
- JG822A HP 10508-V TAA-compliant Switch Chassis
- JG823A HP 10512 TAA-compliant Switch Chassis
+ **7500 (Comware 5) - Version: R6710P01**
* HP Network Products
- JC666A HP 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port
Gig-T/4-port GbE Combo
- JC697A HP 7502 TAA-compliant Main Processing Unit
- JC698A HP 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8
GbE Combo Ports
- JC699A HP 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP
Ports
- JC700A HP 7500 384Gbps TAA-compliant Fabric / Main Processing Unit
- JC701A HP 7500 768Gbps TAA-compliant Fabric / Main Processing Unit
- JD193A HP 7500 384Gbps Fabric Module with 2 XFP Ports
- JD193B HP 7500 384Gbps Fabric Module with 2 XFP Ports
- JD194A HP 7500 384Gbps Fabric Module
- JD194B HP 7500 384Gbps Fabric Module
- JD195A HP 7500 384Gbps Advanced Fabric Module
- JD196A HP 7502 Fabric Module
- JD220A HP 7500 768Gbps Fabric Module
- JD224A HP 7500 384Gbps Fabric Module with 12 SFP Ports
- JD238A HP 7510 Switch Chassis
- JD238B HP 7510 Switch Chassis
- JD239A HP 7506 Switch Chassis
- JD239B HP 7506 Switch Chassis
- JD240A HP 7503 Switch Chassis
- JD240B HP 7503 Switch Chassis
- JD241A HP 7506-V Switch Chassis
- JD241B HP 7506-V Switch Chassis
- JD242A HP 7502 Switch Chassis
- JD242B HP 7502 Switch Chassis
- JD243A HP 7503-S Switch Chassis with 1 Fabric Slot
- JD243B HP 7503-S Switch Chassis with 1 Fabric Slot
- JE164A HP E7902 Switch Chassis
- JE165A HP E7903 Switch Chassis
- JE166A HP E7903 1 Fabric Slot Switch Chassis
- JE167A HP E7906 Switch Chassis
- JE168A HP E7906 Vertical Switch Chassis
- JE169A HP E7910 Switch Chassis
+ **5830 (Comware 5) - Version: R1118P13**
* HP Network Products
- JC691A HP 5830AF-48G Switch with 1 Interface Slot
- JC694A HP 5830AF-96G Switch
- JG316A HP 5830AF-48G TAA-compliant Switch w/1 Interface Slot
- JG374A HP 5830AF-96G TAA-compliant Switch
+ **5800 (Comware 5) - Version: R1809P11**
* HP Network Products
- JC099A HP 5800-24G-PoE Switch
- JC099B HP 5800-24G-PoE+ Switch
- JC100A HP 5800-24G Switch
- JC100B HP 5800-24G Switch
- JC101A HP 5800-48G Switch with 2 Slots
- JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots
- JC103A HP 5800-24G-SFP Switch
- JC103B HP 5800-24G-SFP Switch with 1 Interface Slot
- JC104A HP 5800-48G-PoE Switch
- JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot
- JC105A HP 5800-48G Switch
- JC105B HP 5800-48G Switch with 1 Interface Slot
- JG254A HP 5800-24G-PoE+ TAA-compliant Switch
- JG254B HP 5800-24G-PoE+ TAA-compliant Switch
- JG255A HP 5800-24G TAA-compliant Switch
- JG255B HP 5800-24G TAA-compliant Switch
- JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot
- JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot
- JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot
- JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot
- JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot
- JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot
- JG225A HP 5800AF-48G Switch
- JG225B HP 5800AF-48G Switch
- JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots
- JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface
- JG243A HP 5820-24XG-SFP+ TAA-compliant Switch
- JG243B HP 5820-24XG-SFP+ TAA-compliant Switch
- JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots
& 1 OAA Slot
- JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots
and 1 OAA Slot
- JC106A HP 5820-14XG-SFP+ Switch with 2 Slots
- JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots & 1 OAA Slot
- JG219A HP 5820AF-24XG Switch
- JG219B HP 5820AF-24XG Switch
- JC102A HP 5820-24XG-SFP+ Switch
- JC102B HP 5820-24XG-SFP+ Switch
+ **5500 HI (Comware 5) - Version: R5501P17**
* HP Network Products
- JG311A HP 5500-24G-4SFP HI Switch with 2 Interface Slots
- JG312A HP 5500-48G-4SFP HI Switch with 2 Interface Slots
- JG541A HP 5500-24G-PoE+-4SFP HI Switch with 2 Interface Slots
- JG542A HP 5500-48G-PoE+-4SFP HI Switch with 2 Interface Slots
- JG543A HP 5500-24G-SFP HI Switch with 2 Interface Slots
- JG679A HP 5500-24G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface
Slots
- JG680A HP 5500-48G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface
Slots
- JG681A HP 5500-24G-SFP HI TAA-compliant Switch with 2 Interface Slots
+ **5500 EI (Comware 5) - Version: R2221P19**
* HP Network Products
- JD373A HP 5500-24G DC EI Switch
- JD374A HP 5500-24G-SFP EI Switch
- JD375A HP 5500-48G EI Switch
- JD376A HP 5500-48G-PoE EI Switch
- JD377A HP 5500-24G EI Switch
- JD378A HP 5500-24G-PoE EI Switch
- JD379A HP 5500-24G-SFP DC EI Switch
- JG240A HP 5500-48G-PoE+ EI Switch with 2 Interface Slots
- JG241A HP 5500-24G-PoE+ EI Switch with 2 Interface Slots
- JG249A HP 5500-24G-SFP EI TAA-compliant Switch with 2 Interface
- JG250A HP 5500-24G EI TAA-compliant Switch with 2 Interface Slots
- JG251A HP 5500-48G EI TAA-compliant Switch with 2 Interface Slots
- JG252A HP 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface
Slots
- JG253A HP 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface
Slots
+ **4800G (Comware 5) - Version: R2221P19**
* HP Network Products
- JD007A HP 4800-24G Switch
- JD008A HP 4800-24G-PoE Switch
- JD009A HP 4800-24G-SFP Switch
- JD010A HP 4800-48G Switch
- JD011A HP 4800-48G-PoE Switch
+ **5500SI (Comware 5) - Version: R2221P20**
* HP Network Products
- JD369A HP 5500-24G SI Switch
- JD370A HP 5500-48G SI Switch
- JD371A HP 5500-24G-PoE SI Switch
- JD372A HP 5500-48G-PoE SI Switch
- JG238A HP 5500-24G-PoE+ SI Switch with 2 Interface Slots
- JG239A HP 5500-48G-PoE+ SI Switch with 2 Interface Slots
+ **4500G (Comware 5) - Version: R2221P20**
* HP Network Products
- JF428A HP 4510-48G Switch
- JF847A HP 4510-24G Switch
+ **5120 EI (Comware 5) - Version: R2221P20**
* HP Network Products
- JE066A HP 5120-24G EI Switch
- JE067A HP 5120-48G EI Switch
- JE068A HP 5120-24G EI Switch with 2 Interface Slots
- JE069A HP 5120-48G EI Switch with 2 Interface Slots
- JE070A HP 5120-24G-PoE EI 2-slot Switch
- JE071A HP 5120-48G-PoE EI 2-slot Switch
- JG236A HP 5120-24G-PoE+ EI Switch with 2 Interface Slots
- JG237A HP 5120-48G-PoE+ EI Switch with 2 Interface Slots
- JG245A HP 5120-24G EI TAA-compliant Switch with 2 Interface Slots
- JG246A HP 5120-48G EI TAA-compliant Switch with 2 Interface Slots
- JG247A HP 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots
- JG248A HP 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots
+ **4210G (Comware 5) - Version: R2221P20**
* HP Network Products
- JF844A HP 4210-24G Switch
- JF845A HP 4210-48G Switch
- JF846A HP 4210-24G-PoE Switch
+ **5120 SI (Comware 5) - Version: R1516**
* HP Network Products
- JE072A HP 5120-48G SI Switch
- JE072B HPE 5120 48G SI Switch
- JE073A HP 5120-16G SI Switch
- JE073B HPE 5120 16G SI Switch
- JE074A HP 5120-24G SI Switch
- JE074B HPE 5120 24G SI Switch
- JG091A HP 5120-24G-PoE+ (370W) SI Switch
- JG091B HPE 5120 24G PoE+ (370W) SI Switch
- JG092A HP 5120-24G-PoE+ (170W) SI Switch
- JG309B HPE 5120 8G PoE+ (180W) SI Switch
- JG310B HPE 5120 8G PoE+ (65W) SI Switch
+ **3610 (Comware 5) - Version: R5319P14**
* HP Network Products
- JD335A HP 3610-48 Switch
- JD336A HP 3610-24-4G-SFP Switch
- JD337A HP 3610-24-2G-2G-SFP Switch
- JD338A HP 3610-24-SFP Switch
+ **3600V2 (Comware 5) - Version: R2110P06**
* HP Network Products
- JG299A HP 3600-24 v2 EI Switch
- JG299B HP 3600-24 v2 EI Switch
- JG300A HP 3600-48 v2 EI Switch
- JG300B HP 3600-48 v2 EI Switch
- JG301A HP 3600-24-PoE+ v2 EI Switch
- JG301B HP 3600-24-PoE+ v2 EI Switch
- JG301C HP 3600-24-PoE+ v2 EI Switch
- JG302A HP 3600-48-PoE+ v2 EI Switch
- JG302B HP 3600-48-PoE+ v2 EI Switch
- JG302C HP 3600-48-PoE+ v2 EI Switch
- JG303A HP 3600-24-SFP v2 EI Switch
- JG303B HP 3600-24-SFP v2 EI Switch
- JG304A HP 3600-24 v2 SI Switch
- JG304B HP 3600-24 v2 SI Switch
- JG305A HP 3600-48 v2 SI Switch
- JG305B HP 3600-48 v2 SI Switch
- JG306A HP 3600-24-PoE+ v2 SI Switch
- JG306B HP 3600-24-PoE+ v2 SI Switch
- JG306C HP 3600-24-PoE+ v2 SI Switch
- JG307A HP 3600-48-PoE+ v2 SI Switch
- JG307B HP 3600-48-PoE+ v2 SI Switch
- JG307C HP 3600-48-PoE+ v2 SI Switch
+ **3100V2-48 (Comware 5) - Version: R2110P06**
* HP Network Products
- JG315A HP 3100-48 v2 Switch
- JG315B HP 3100-48 v2 Switch
+ **HP870 (Comware 5) - Version: R2607P46**
* HP Network Products
- JG723A HP 870 Unified Wired-WLAN Appliance
- JG725A HP 870 Unified Wired-WLAN TAA-compliant Appliance
+ **HP850 (Comware 5) - Version: R2607P46**
* HP Network Products
- JG722A HP 850 Unified Wired-WLAN Appliance
- JG724A HP 850 Unified Wired-WLAN TAA-compliant Appliance
+ **HP830 (Comware 5) - Version: R3507P46**
* HP Network Products
- JG640A HP 830 24-Port PoE+ Unified Wired-WLAN Switch
- JG641A HP 830 8-port PoE+ Unified Wired-WLAN Switch
- JG646A HP 830 24-Port PoE+ Unified Wired-WLAN TAA-compliant Switch
- JG647A HP 830 8-Port PoE+ Unified Wired-WLAN TAA-compliant
+ **HP6000 (Comware 5) - Version: R2507P46**
* HP Network Products
- JG639A HP 10500/7500 20G Unified Wired-WLAN Module
- JG645A HP 10500/7500 20G Unified Wired-WLAN TAA-compliant Module
+ **WX5004-EI (Comware 5) - Version: R2507P46**
* HP Network Products
- JD447B HP WX5002 Access Controller
- JD448A HP WX5004 Access Controller
- JD448B HP WX5004 Access Controller
- JD469A HP WX5004 Access Controller
+ **SecBlade FW (Comware 5) - Version: R3181P07**
* HP Network Products
- JC635A HP 12500 VPN Firewall Module
- JD245A HP 9500 VPN Firewall Module
- JD249A HP 10500/7500 Advanced VPN Firewall Module
- JD250A HP 6600 Firewall Processing Router Module
- JD251A HP 8800 Firewall Processing Module
- JD255A HP 5820 VPN Firewall Module
+ **F1000-E (Comware 5) - Version: R3181P07**
* HP Network Products
- JD272A HP F1000-E VPN Firewall Appliance
+ **F1000-A-EI (Comware 5) - Version: R3734P08**
* HP Network Products
- JG214A HP F1000-A-EI VPN Firewall Appliance
+ **F1000-S-EI (Comware 5) - Version: R3734P08**
* HP Network Products
- JG213A HP F1000-S-EI VPN Firewall Appliance
+ **F5000-A (Comware 5) - Version: F3210P26**
* HP Network Products
- JD259A HP A5000-A5 VPN Firewall Chassis
- JG215A HP F5000 Firewall Main Processing Unit
- JG216A HP F5000 Firewall Standalone Chassis
+ **U200S and CS (Comware 5) - Version: F5123P33**
* HP Network Products
- JD273A HP U200-S UTM Appliance
+ **U200A and M (Comware 5) - Version: F5123P33**
* HP Network Products
- JD275A HP U200-A UTM Appliance
+ **F5000-C/S (Comware 5) - Version: R3811P05**
* HP Network Products
- JG650A HP F5000-C VPN Firewall Appliance
- JG370A HP F5000-S VPN Firewall Appliance
+ **SecBlade III (Comware 5) - Version: R3820P06**
* HP Network Products
- JG371A HP 12500 20Gbps VPN Firewall Module
- JG372A HP 10500/11900/7500 20Gbps VPN Firewall Module
+ **6600 RSE RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**
* HP Network Products
- JC177A HP 6608 Router
- JC177B HP 6608 Router Chassis
- JC178A HP 6604 Router Chassis
- JC178B HP 6604 Router Chassis
- JC496A HP 6616 Router Chassis
- JC566A HP 6600 RSE-X1 Router Main Processing Unit
- JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
+ **6600 RPE RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**
* HP Network Products
- JC165A) HP 6600 RPE-X1 Router Module
- JG781A) HP 6600 RPE-X1 TAA-compliant Main Processing Unit
+ **6602 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**
* HP Network Products
- JC176A) HP 6602 Router Chassis
+ **HSR6602 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**
* HP Network Products
- JC177A HP 6608 Router
- JC177B HP 6608 Router Chassis
- JC178A HP 6604 Router Chassis
- JC178B HP 6604 Router Chassis
- JC496A HP 6616 Router Chassis
- JG353A HP HSR6602-G Router
- JG354A HP HSR6602-XG Router
- JG355A HP 6600 MCP-X1 Router Main Processing Unit
- JG356A HP 6600 MCP-X2 Router Main Processing Unit
- JG776A HP HSR6602-G TAA-compliant Router
- JG777A HP HSR6602-XG TAA-compliant Router
- JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
+ **HSR6800 RU (Comware 5 Low Encryption SW) - Version: R3303P23-RU**
* HP Network Products
- JG361A HP HSR6802 Router Chassis
- JG361B HP HSR6802 Router Chassis
- JG362A HP HSR6804 Router Chassis
- JG362B HP HSR6804 Router Chassis
- JG363A HP HSR6808 Router Chassis
- JG363B HP HSR6808 Router Chassis
- JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
- JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
+ **SMB1910 (Comware 5) - Version: R1111**
* HP Network Products
- JG540A HP 1910-48 Switch
- JG539A HP 1910-24-PoE+ Switch
- JG538A HP 1910-24 Switch
- JG537A HP 1910-8 -PoE+ Switch
- JG536A HP 1910-8 Switch
+ **SMB1920 (Comware 5) - Version: R1109**
* HP Network Products
- JG928A HP 1920-48G-PoE+ (370W) Switch
- JG927A HP 1920-48G Switch
- JG926A HP 1920-24G-PoE+ (370W) Switch
- JG925A HP 1920-24G-PoE+ (180W) Switch
- JG924A HP 1920-24G Switch
- JG923A HP 1920-16G Switch
- JG922A HP 1920-8G-PoE+ (180W) Switch
- JG921A HP 1920-8G-PoE+ (65W) Switch
- JG920A HP 1920-8G Switch
+ **V1910 (Comware 5) - Version: R1516**
* HP Network Products
- JE005A HP 1910-16G Switch
- JE006A HP 1910-24G Switch
- JE007A HP 1910-24G-PoE (365W) Switch
- JE008A HP 1910-24G-PoE(170W) Switch
- JE009A HP 1910-48G Switch
- JG348A HP 1910-8G Switch
- JG349A HP 1910-8G-PoE+ (65W) Switch
- JG350A HP 1910-8G-PoE+ (180W) Switch
+ **SMB 1620 (Comware 5) - Version: R1108**
* HP Network Products
- JG914A HP 1620-48G Switch
- JG913A HP 1620-24G Switch
- JG912A HP 1620-8G Switch
**COMWARE 7 Products**
+ **12500 (Comware 7) - Version: R7376**
* HP Network Products
- JC072B HP 12500 Main Processing Unit
- JC085A HP A12518 Switch Chassis
- JC086A HP A12508 Switch Chassis
- JC652A HP 12508 DC Switch Chassis
- JC653A HP 12518 DC Switch Chassis
- JC654A HP 12504 AC Switch Chassis
- JC655A HP 12504 DC Switch Chassis
- JF430A HP A12518 Switch Chassis
- JF430B HP 12518 Switch Chassis
- JF430C HP 12518 AC Switch Chassis
- JF431A HP A12508 Switch Chassis
- JF431B HP 12508 Switch Chassis
- JF431C HP 12508 AC Switch Chassis
- JG497A HP 12500 MPU w/Comware V7 OS
- JG782A HP FF 12508E AC Switch Chassis
- JG783A HP FF 12508E DC Switch Chassis
- JG784A HP FF 12518E AC Switch Chassis
- JG785A HP FF 12518E DC Switch Chassis
- JG802A HP FF 12500E MPU
+ **10500 (Comware 7) - Version: R7170**
* HP Network Products
- JC611A HP 10508-V Switch Chassis
- JC612A HP 10508 Switch Chassis
- JC613A HP 10504 Switch Chassis
- JC748A HP 10512 Switch Chassis
- JG608A HP FlexFabric 11908-V Switch Chassis
- JG609A HP FlexFabric 11900 Main Processing Unit
- JG820A HP 10504 TAA Switch Chassis
- JG821A HP 10508 TAA Switch Chassis
- JG822A HP 10508-V TAA Switch Chassis
- JG823A HP 10512 TAA Switch Chassis
- JG496A HP 10500 Type A MPU w/Comware v7 OS
- JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating
System
- JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System
Main Processing Unit
+ **12900 (Comware 7) - Version: R1138P01**
* HP Network Products
- JG619A HP FlexFabric 12910 Switch AC Chassis
- JG621A HP FlexFabric 12910 Main Processing Unit
- JG632A HP FlexFabric 12916 Switch AC Chassis
- JG634A HP FlexFabric 12916 Main Processing Unit
- JH104A HP FlexFabric 12900E Main Processing Unit
- JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
- JH263A HP FlexFabric 12904E Main Processing Unit
- JH255A HP FlexFabric 12908E Switch Chassis
- JH262A HP FlexFabric 12904E Switch Chassis
- JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
- JH103A HP FlexFabric 12916E Switch Chassis
+ **5900 (Comware 7) - Version: R2422P01**
* HP Network Products
- JC772A HP 5900AF-48XG-4QSFP+ Switch
- JG296A HP 5920AF-24XG Switch
- JG336A HP 5900AF-48XGT-4QSFP+ Switch
- JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
- JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
- JG555A HP 5920AF-24XG TAA Switch
- JG838A HP FF 5900CP-48XG-4QSFP+ Switch
- JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
- JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
- JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
+ **MSR1000 (Comware 7) - Version: R0305P04**
* HP Network Products
- JG875A HP MSR1002-4 AC Router
- JH060A HP MSR1003-8S AC Router
+ **MSR2000 (Comware 7) - Version: R0305P04**
* HP Network Products
- JG411A HP MSR2003 AC Router
- JG734A HP MSR2004-24 AC Router
- JG735A HP MSR2004-48 Router
- JG866A HP MSR2003 TAA-compliant AC Router
+ **MSR3000 (Comware 7) - Version: R0305P04**
* HP Network Products
- JG404A HP MSR3064 Router
- JG405A HP MSR3044 Router
- JG406A HP MSR3024 AC Router
- JG407A HP MSR3024 DC Router
- JG408A HP MSR3024 PoE Router
- JG409A HP MSR3012 AC Router
- JG410A HP MSR3012 DC Router
- JG861A HP MSR3024 TAA-compliant AC Router
+ **MSR4000 (Comware 7) - Version: R0305P04**
* HP Network Products
- JG402A HP MSR4080 Router Chassis
- JG403A HP MSR4060 Router Chassis
- JG412A HP MSR4000 MPU-100 Main Processing Unit
- JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit
+ **VSR (Comware 7) - Version: E0321P01**
* HP Network Products
- JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation
Software
- JG811AAE HP VSR1001 Comware 7 Virtual Services Router
- JG812AAE HP VSR1004 Comware 7 Virtual Services Router
- JG813AAE HP VSR1008 Comware 7 Virtual Services Router
+ **7900 (Comware 7) - Version: R2138P01**
* HP Network Products
- JG682A HP FlexFabric 7904 Switch Chassis
- JG841A HP FlexFabric 7910 Switch Chassis
- JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit
- JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit
- JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis
- JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis
- JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main
Processing Unit
- JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main
Processing Unit
+ **5130 (Comware 7) - Version: R3109P16**
* HP Network Products
- JG932A HP 5130-24G-4SFP+ EI Switch
- JG933A HP 5130-24G-SFP-4SFP+ EI Switch
- JG934A HP 5130-48G-4SFP+ EI Switch
- JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch
- JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch
- JG938A HP 5130-24G-2SFP+-2XGT EI Switch
- JG939A HP 5130-48G-2SFP+-2XGT EI Switch
- JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch
- JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch
- JG975A HP 5130-24G-4SFP+ EI Brazil Switch
- JG976A HP 5130-48G-4SFP+ EI Brazil Switch
- JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch
- JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch
+ **5700 (Comware 7) - Version: R2422P01**
* HP Network Products
- JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch
- JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch
- JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch
- JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch
- JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch
- JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch
+ **5930 (Comware 7) - Version: R2422P01**
* HP Network Products
- JG726A HP FlexFabric 5930 32QSFP+ Switch
- JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch
- JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch
- JH179A HP FlexFabric 5930 4-slot Switch
- JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch
- JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch
+ **HSR6600 (Comware 7) - Version: R7103P05**
* HP Network Products
- JG353A HP HSR6602-G Router
- JG354A HP HSR6602-XG Router
- JG776A HP HSR6602-G TAA-compliant Router
- JG777A HP HSR6602-XG TAA-compliant Router
+ **HSR6800 (Comware 7) - Version: R7103P05**
* HP Network Products
- JG361A HP HSR6802 Router Chassis
- JG361B HP HSR6802 Router Chassis
- JG362A HP HSR6804 Router Chassis
- JG362B HP HSR6804 Router Chassis
- JG363A HP HSR6808 Router Chassis
- JG363B HP HSR6808 Router Chassis
- JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
- JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing
- JH075A HP HSR6800 RSE-X3 Router Main Processing Unit
+ **1950 (Comware 7) - Version: R3109P16**
* HP Network Products
- JG960A HP 1950-24G-4XG Switch
- JG961A HP 1950-48G-2SFP+-2XGT Switch
- JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch
- JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch
+ **7500 (Comware 7) - Version: R7170**
* HP Network Products
- JD238C HP 7510 Switch Chassis
- JD239C HP 7506 Switch Chassis
- JD240C HP 7503 Switch Chassis
- JD242C HP 7502 Switch Chassis
- JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only
Main Processing Unit
- JH208A HP 7502 Main Processing Unit
- JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port
40GbE QSFP+ Main Processing Unit
**iMC Products**
+ **iMC Plat - Version: iMC Plat 7.1 E0303P16**
* HP Network Products
- JD125A HP IMC Std S/W Platform w/100-node
- JD126A HP IMC Ent S/W Platform w/100-node
- JD808A HP IMC Ent Platform w/100-node License
- JD814A HP A-IMC Enterprise Edition Software DVD Media
- JD815A HP IMC Std Platform w/100-node License
- JD816A HP A-IMC Standard Edition Software DVD Media
- JF288AAE HP Network Director to Intelligent Management Center
Upgrade E-LTU
- JF289AAE HP Enterprise Management System to Intelligent Management
Center Upgrade E-LTU
- JF377A HP IMC Std S/W Platform w/100-node Lic
- JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU
- JF378A HP IMC Ent S/W Platform w/200-node Lic
- JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU
- JG546AAE HP IMC Basic SW Platform w/50-node E-LTU
- JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
- JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU
- JG550AAE HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU
- JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU
- JG659AAE HP IMC Smart Connect VAE E-LTU
- JG660AAE HP IMC Smart Connect w/WLM VAE E-LTU
- JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU
- JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU
- JG766AAE HP IMC SmCnct Vrtl Applnc SW E-LTU
- JG767AAE HP IMC SmCnct WSM Vrtl Applnc SW E-LTU
- JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU
+ **iMC iNode - Version: iNode PC 7.1 E0313, or, iNode PC 7.2 (E0401)**
* HP Network Products
- JD144A HP A-IMC User Access Management Software Module with 200-user
License
- JD147A HP IMC Endpoint Admission Defense Software Module with
200-user License
- JD435A HP A-IMC Endpoint Admission Defense Client Software
- JF388A HP IMC User Authentication Management Software Module with
200-user License
- JF388AAE HP IMC User Authentication Management Software Module with
200-user E-LTU
- JF391A HP IMC Endpoint Admission Defense Software Module with
200-user License
- JF391AAE HP IMC Endpoint Admission Defense Software Module with
200-user E-LTU
- JG752AAE HP IMC User Access Manager Software Module with 50-user
E-LTU
- JG754AAE) HP IMC Endpoint Admission Defense Software Module with
50-user E-LTU
+ **iMC TAM_UAM - Version: iMC UAM_TAM 7.1 (E0307)**
* HP Network Products
- JF388A HP IMC UAM S/W MODULE W/200-USER LICENSE
- JF388AAE HP IMC UAM S/W MODULE W/200-USER E-LTU
- JG752AAE HP IMC UAM SW MOD W/ 50-USER E-LTU
- JG483A HP IMC TAM S/W MODULE W/100-NODE LIC
- JG483AAE HP IMC TAM S/W MODULE W/100-NODE E-LTU
- JG764AAE HP IMC TAM SW MOD W/ 50-NODE E-LTU
+ **iMC NSM - Version: iMC WSM 7.1 E0303P10**
* HP Network Products
- JD456A HP IMC WSM Software Module with 50-Access Point License
- JF414A HP IMC Wireless Service Manager Software Module with 50-Access
Point License
- JF414AAE HP IMC Wireless Service Manager Software Module with
50-Access Point E-LTU
- JG551AAE HP PCM+ Mobility Manager to IMC Wireless Service Manager
Module Upgrade with 250 Access Point E-LTU
- JG758AAE HP IMC WSM/RTLS w/ 50-node E-LTU
- JG769AAE HP PCM Mobility Manager to IMC Wireless Service Manager Upg
with 250-node E-LTU
**VCX Products**
+ **VCX - Version: 9.8.18**
* HP Network Products
- J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr
- J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr
- JC517A HP VCX V7205 Platform w/DL 360 G6 Server
- JE355A HP VCX V6000 Branch Platform 9.0
- JC516A HP VCX V7005 Platform w/DL 120 G6 Server
- JC518A HP VCX Connect 200 Primry 120 G6 Server
- J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr
- JE341A HP VCX Connect 100 Secondary
- JE252A HP VCX Connect Primary MIM Module
- JE253A HP VCX Connect Secondary MIM Module
- JE254A HP VCX Branch MIM Module
- JE355A HP VCX V6000 Branch Platform 9.0
- JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod
- JD023A HP MSR30-40 Router with VCX MIM Module
- JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM
- JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod
- JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod
- JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod
- JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS
- JE340A HP VCX Connect 100 Pri Server 9.0
- JE342A HP VCX Connect 100 Sec Server 9.0
HISTORY
Version:1 (rev.1) - 5 July 2016 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Resolution
==========
All OpenSSL users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.1p"
References
==========
[ 1 ] CVE-2015-1793
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1793
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-15
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
=============================================================================
FreeBSD-SA-15:12.openssl Security Advisory
The FreeBSD Project
Topic: OpenSSL alternate chains certificate forgery vulnerability
Category: contrib
Module: openssl
Announced: 2015-07-09
Credits: Adam Langley/David Benjamin (Google/BoringSSL), OpenSSL
Affects: FreeBSD 10.1-STABLE after 2015-06-11 and prior to the
correction date.
Corrected: 2015-07-09 17:17:22 UTC (stable/10, 10.2-PRERELEASE,
10.2-BETA1)
CVE Name: CVE-2015-1793
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
I. Background
FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is
a collaborative effort to develop a robust, commercial-grade, full-featured
Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols as well as a full-strength
general purpose cryptography library.
II.
An error in the implementation of this logic could erroneously mark
certificate as trusted when they should not.
III.
IV. Workaround
No workaround is available.
NOTE WELL: This issue does not affect earlier FreeBSD releases, including the
supported 8.4, 9.3 and 10.1-RELEASE because the alternative certificate chain
feature was not introduced in these releases. Only 10.1-STABLE after
2015-06-11 and prior to the correction date is affected.
V. Solution
Upgrade your vulnerable system to the latest supported FreeBSD stable/10
branch dated after the correction date.
Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
Restart all deamons using the library, or reboot the system.
VI. Correction details
The following list contains the correction revision numbers for each
affected branch.
Branch/path Revision
- -------------------------------------------------------------------------
stable/10/ r285330
- -------------------------------------------------------------------------
To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:
# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
VII.
Note
====
As per our previous announcements and our Release Strategy
(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions
1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these
releases will be provided after that date. Users of these releases are advised
to upgrade.
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv_20150709.txt
Note: the online version of the advisory may be updated with additional
details over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html
| VAR-201707-0081 | CVE-2015-2280 |
AirLink101 SkyIPCam1620W 'snwrite.cgi' OS Command Injection Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201507-0075 |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
snwrite.cgi in AirLink101 SkyIPCam1620W Wireless N MPEG4 3GPP network camera with firmware FW_AIC1620W_1.1.0-12_20120709_r1192.pck allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the mac parameter. AirLink101 SkyIPCam1620W Wireless N MPEG4 3GPP Network Camera is a wireless network camera product.
Successfully exploiting this issue may allow an attacker to execute arbitrary OS commands in the context of the affected device
| VAR-201507-0709 | No CVE | Multiple vulnerabilities in D-Link DSP-W |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The D-Link DSP w110 is a socket that wirelessly controls the power switch. D-Link DSP-W has multiple security vulnerabilities that allow an attacker to exploit vulnerabilities to bypass security restrictions, obtain sensitive information, and upload files arbitrarily.
| VAR-201507-0550 | CVE-2015-4432 | Adobe Flash Player and Adobe AIR Heap-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3135 and CVE-2015-5118. This vulnerability CVE-2015-3135 and CVE-2015-5118 Is a different vulnerability.An attacker could execute arbitrary code. Failed attempts will likely cause a denial-of-service condition; this can result in the attacker gaining complete control of the affected system.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2014-0578, CVE-2015-3114,
CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.481.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0551 | CVE-2015-4433 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, and CVE-2015-3122. This vulnerability CVE-2015-3119 , CVE-2015-3120 , CVE-2015-3121 ,and CVE-2015-3122 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-843:Access of Resource Using Incompatible Type ( Mixing of molds ) Has been identified. http://cwe.mitre.org/data/definitions/843.htmlUnspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0484 | CVE-2015-4428 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4430, and CVE-2015-5117. This vulnerability CVE-2015-3118 , CVE-2015-3124 , CVE-2015-3127 , CVE-2015-3128 , CVE-2015-3129 , CVE-2015-3131 , CVE-2015-3132 , CVE-2015-3136 , CVE-2015-3137 , CVE-2015-4430 ,and CVE-2015-5117 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2014-0578, CVE-2015-3114,
CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.481.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0487 | CVE-2015-4431 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, and CVE-2015-3134. This vulnerability CVE-2015-3117 , CVE-2015-3123 , CVE-2015-3130 , CVE-2015-3133 ,and CVE-2015-3134 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0485 | CVE-2015-4429 | Adobe Flash Player and Adobe AIR Service disruption in (DoS) Vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-3126. This vulnerability CVE-2015-3126 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. http://cwe.mitre.org/data/definitions/476.htmlDenial of service by attacker (NULL Pointer dereference ) There is a possibility of being affected unspecified, such as being in a state.
Attackers can exploit these issues to cause a denial-of-service condition. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2014-0578, CVE-2015-3114,
CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.481.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0486 | CVE-2015-4430 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, and CVE-2015-5117. This vulnerability CVE-2015-3118 , CVE-2015-3124 , CVE-2015-3127 , CVE-2015-3128 , CVE-2015-3129 , CVE-2015-3131 , CVE-2015-3132 , CVE-2015-3136 , CVE-2015-3137 , CVE-2015-4428 ,and CVE-2015-5117 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2014-0578, CVE-2015-3114,
CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.481.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0344 | CVE-2014-0578 | Adobe Flash Player and Adobe AIR Vulnerabilities that bypass the same origin policy |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, and CVE-2015-5116. This vulnerability CVE-2015-3115 , CVE-2015-3116 , CVE-2015-3125 ,and CVE-2015-5116 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlA third party can bypass the same origin policy.
Attackers can exploit these issues to view content from a browser window in another domain or security zone. This may allow the attacker to obtain sensitive information or aid in further attacks. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2014-0578, CVE-2015-3114,
CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.481.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0101 | CVE-2015-5118 | Adobe Flash Player and Adobe AIR Heap-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3135 and CVE-2015-4432. This vulnerability CVE-2015-3135 and CVE-2015-4432 Is a different vulnerability.An attacker could execute arbitrary code. Failed attempts will likely cause a denial-of-service condition; this can result in the attacker gaining complete control of the affected system.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2014-0578, CVE-2015-3114,
CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.481.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0100 | CVE-2015-5117 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, and CVE-2015-4430. This vulnerability CVE-2015-3118 , CVE-2015-3124 , CVE-2015-3127 , CVE-2015-3128 , CVE-2015-3129 , CVE-2015-3131 , CVE-2015-3132 , CVE-2015-3136 , CVE-2015-3137 , CVE-2015-4428 ,and CVE-2015-4430 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2014-0578, CVE-2015-3114,
CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.481.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0099 | CVE-2015-5116 | Adobe Flash Player and Adobe AIR Vulnerabilities that bypass the same origin policy |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, and CVE-2015-3125. This vulnerability CVE-2014-0578 , CVE-2015-3115 , CVE-2015-3116 ,and CVE-2015-3125 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlA third party can bypass the same origin policy.
Attackers can exploit these issues to view content from a browser window in another domain or security zone. This may allow the attacker to obtain sensitive information or aid in further attacks. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2014-0578, CVE-2015-3114,
CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.481.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0085 | CVE-2015-3121 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3120, CVE-2015-3122, and CVE-2015-4433. This vulnerability CVE-2015-3119 , CVE-2015-3120 , CVE-2015-3122 ,and CVE-2015-4433 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-843:Access of Resource Using Incompatible Type ( Mixing of molds ) Has been identified. http://cwe.mitre.org/data/definitions/843.htmlUnspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0084 | CVE-2015-3120 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3119, CVE-2015-3121, CVE-2015-3122, and CVE-2015-4433. This vulnerability CVE-2015-3119 , CVE-2015-3121 , CVE-2015-3122 ,and CVE-2015-4433 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-843:Access of Resource Using Incompatible Type ( Mixing of molds ) Has been identified. http://cwe.mitre.org/data/definitions/843.htmlUnspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0083 | CVE-2015-3119 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, and CVE-2015-4433. This vulnerability CVE-2015-3120 , CVE-2015-3121 , CVE-2015-3122 ,and CVE-2015-4433 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-843:Access of Resource Using Incompatible Type ( Mixing of molds ) Has been identified. http://cwe.mitre.org/data/definitions/843.htmlUnspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0082 | CVE-2015-3118 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117. This vulnerability CVE-2015-3124 , CVE-2015-3127 , CVE-2015-3128 , CVE-2015-3129 , CVE-2015-3131 , CVE-2015-3132 , CVE-2015-3136 , CVE-2015-3137 , CVE-2015-4428 , CVE-2015-4430 ,and CVE-2015-5117 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2014-0578, CVE-2015-3114,
CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.481.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201507-0081 | CVE-2015-3117 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, and CVE-2015-4431. This vulnerability CVE-2015-3123 , CVE-2015-3130 , CVE-2015-3133 , CVE-2015-3134 ,and CVE-2015-4431 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.481"
References
==========
[ 1 ] CVE-2014-0578
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578
[ 2 ] CVE-2015-3113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113
[ 3 ] CVE-2015-3114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114
[ 4 ] CVE-2015-3115
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115
[ 5 ] CVE-2015-3116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116
[ 6 ] CVE-2015-3117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117
[ 7 ] CVE-2015-3118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118
[ 8 ] CVE-2015-3119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119
[ 9 ] CVE-2015-3120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120
[ 10 ] CVE-2015-3121
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121
[ 11 ] CVE-2015-3122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122
[ 12 ] CVE-2015-3123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123
[ 13 ] CVE-2015-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124
[ 14 ] CVE-2015-3125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125
[ 15 ] CVE-2015-3126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126
[ 16 ] CVE-2015-3127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127
[ 17 ] CVE-2015-3128
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128
[ 18 ] CVE-2015-3129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129
[ 19 ] CVE-2015-3130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130
[ 20 ] CVE-2015-3131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131
[ 21 ] CVE-2015-3132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132
[ 22 ] CVE-2015-3133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133
[ 23 ] CVE-2015-3134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134
[ 24 ] CVE-2015-3135
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135
[ 25 ] CVE-2015-3136
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136
[ 26 ] CVE-2015-3137
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137
[ 27 ] CVE-2015-4428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428
[ 28 ] CVE-2015-4429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429
[ 29 ] CVE-2015-4430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430
[ 30 ] CVE-2015-4431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431
[ 31 ] CVE-2015-4432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432
[ 32 ] CVE-2015-4433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433
[ 33 ] CVE-2015-5116
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116
[ 34 ] CVE-2015-5117
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117
[ 35 ] CVE-2015-5118
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118
[ 36 ] CVE-2015-5119
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-13
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1214-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1214.html
Issue date: 2015-07-08
CVE Names: CVE-2014-0578 CVE-2015-3114 CVE-2015-3115
CVE-2015-3116 CVE-2015-3117 CVE-2015-3118
CVE-2015-3119 CVE-2015-3120 CVE-2015-3121
CVE-2015-3122 CVE-2015-3123 CVE-2015-3124
CVE-2015-3125 CVE-2015-3126 CVE-2015-3127
CVE-2015-3128 CVE-2015-3129 CVE-2015-3130
CVE-2015-3131 CVE-2015-3132 CVE-2015-3133
CVE-2015-3134 CVE-2015-3135 CVE-2015-3136
CVE-2015-3137 CVE-2015-4428 CVE-2015-4429
CVE-2015-4430 CVE-2015-4431 CVE-2015-4432
CVE-2015-4433 CVE-2015-5116 CVE-2015-5117
CVE-2015-5118 CVE-2015-5119
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-16
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120,
CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3126,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131,
CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136,
CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431,
CVE-2015-4432, CVE-2015-4433, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1240832 - CVE-2015-5119 flash-plugin: code execution issue in APSA15-03 / APSB15-16
1241171 - flash-plugin: multiple code execution issues fixed in APSB15-16
1241173 - flash-plugin: information disclosure issues fixed in APSB15-16
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.481-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.481-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.481-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0578
https://access.redhat.com/security/cve/CVE-2015-3114
https://access.redhat.com/security/cve/CVE-2015-3115
https://access.redhat.com/security/cve/CVE-2015-3116
https://access.redhat.com/security/cve/CVE-2015-3117
https://access.redhat.com/security/cve/CVE-2015-3118
https://access.redhat.com/security/cve/CVE-2015-3119
https://access.redhat.com/security/cve/CVE-2015-3120
https://access.redhat.com/security/cve/CVE-2015-3121
https://access.redhat.com/security/cve/CVE-2015-3122
https://access.redhat.com/security/cve/CVE-2015-3123
https://access.redhat.com/security/cve/CVE-2015-3124
https://access.redhat.com/security/cve/CVE-2015-3125
https://access.redhat.com/security/cve/CVE-2015-3126
https://access.redhat.com/security/cve/CVE-2015-3127
https://access.redhat.com/security/cve/CVE-2015-3128
https://access.redhat.com/security/cve/CVE-2015-3129
https://access.redhat.com/security/cve/CVE-2015-3130
https://access.redhat.com/security/cve/CVE-2015-3131
https://access.redhat.com/security/cve/CVE-2015-3132
https://access.redhat.com/security/cve/CVE-2015-3133
https://access.redhat.com/security/cve/CVE-2015-3134
https://access.redhat.com/security/cve/CVE-2015-3135
https://access.redhat.com/security/cve/CVE-2015-3136
https://access.redhat.com/security/cve/CVE-2015-3137
https://access.redhat.com/security/cve/CVE-2015-4428
https://access.redhat.com/security/cve/CVE-2015-4429
https://access.redhat.com/security/cve/CVE-2015-4430
https://access.redhat.com/security/cve/CVE-2015-4431
https://access.redhat.com/security/cve/CVE-2015-4432
https://access.redhat.com/security/cve/CVE-2015-4433
https://access.redhat.com/security/cve/CVE-2015-5116
https://access.redhat.com/security/cve/CVE-2015-5117
https://access.redhat.com/security/cve/CVE-2015-5118
https://access.redhat.com/security/cve/CVE-2015-5119
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVnYzEXlSAg2UNWIIRAiYOAJ4hyudjAqMbqOcLAA47WlvgoVG25gCdF1BZ
bxdi7YGr3vmk1ppaEImDJNg=
=KEcy
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce