VARIoT IoT vulnerabilities database
| VAR-201505-0298 | CVE-2015-3064 | Windows and Mac OS X Run on Adobe Reader and Acrobat In JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074. This vulnerability CVE-2015-3060 , CVE-2015-3061 , CVE-2015-3062 , CVE-2015-3063 , CVE-2015-3065 , CVE-2015-3066 , CVE-2015-3067 , CVE-2015-3068 , CVE-2015-3069 , CVE-2015-3071 , CVE-2015-3072 , CVE-2015-3073 and CVE-2015-3074 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlBy the attacker, JavaScript API May limit the execution limit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the DynamicAnnotStore compete method. By creating a specially crafted PDF with specific JavaScript instructions, it is possible to bypass the JavaScript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Reader and Acrobat are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0297 | CVE-2015-3071 | Windows and Mac OS X Run on Adobe Reader and Acrobat In JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074. This vulnerability CVE-2015-3060 , CVE-2015-3061 , CVE-2015-3062 , CVE-2015-3063 , CVE-2015-3064 , CVE-2015-3065 , CVE-2015-3066 , CVE-2015-3067 , CVE-2015-3068 , CVE-2015-3069 , CVE-2015-3072 , CVE-2015-3073 and CVE-2015-3074 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlBy the attacker, JavaScript API May limit the execution limit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within WDAnnotEnumerator. By creating a specially crafted PDF with specific JavaScript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Reader and Acrobat are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0296 | CVE-2015-3070 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-9161, CVE-2015-3046, CVE-2015-3049, CVE-2015-3050, CVE-2015-3051, CVE-2015-3052, CVE-2015-3056, CVE-2015-3057, and CVE-2015-3076. Adobe Reader and Acrobat are prone to multiple memory-corruption vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0295 | CVE-2015-3069 | Windows and Mac OS X Run on Adobe Reader and Acrobat In JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3071, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074. This vulnerability CVE-2015-3060 , CVE-2015-3061 , CVE-2015-3062 , CVE-2015-3063 , CVE-2015-3064 , CVE-2015-3065 , CVE-2015-3066 , CVE-2015-3067 , CVE-2015-3068 , CVE-2015-3071 , CVE-2015-3072 , CVE-2015-3073 and CVE-2015-3074 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlBy the attacker, JavaScript API May limit the execution limit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the AFNSimple_Calculate function. By creating a specially crafted PDF with specific JavaScript instructions, it is possible to bypass the JavaScript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Reader and Acrobat are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0294 | CVE-2015-3068 | Windows and Mac OS X Run on Adobe Reader and Acrobat In JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074. This vulnerability CVE-2015-3060 , CVE-2015-3061 , CVE-2015-3062 , CVE-2015-3063 , CVE-2015-3064 , CVE-2015-3065 , CVE-2015-3066 , CVE-2015-3067 , CVE-2015-3069 , CVE-2015-3071 , CVE-2015-3072 , CVE-2015-3073 and CVE-2015-3074 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlBy the attacker, JavaScript API May limit the execution limit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the app.Monitors select method. By creating a specially crafted PDF with specific JavaScript instructions, it is possible to bypass the JavaScript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Reader and Acrobat are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0293 | CVE-2015-3060 | Windows and Mac OS X Run on Adobe Reader and Acrobat In JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3068, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074. This vulnerability CVE-2015-3061 , CVE-2015-3062 , CVE-2015-3063 , CVE-2015-3064 , CVE-2015-3065 , CVE-2015-3066 , CVE-2015-3067 , CVE-2015-3068 , CVE-2015-3069 , CVE-2015-3071 , CVE-2015-3072 , CVE-2015-3073 and CVE-2015-3074 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlBy the attacker, JavaScript API May limit the execution limit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the indexOfNextEssential method. By creating a specially crafted PDF with specific JavaScript instructions, it is possible to bypass the JavaScript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code. Adobe Reader and Acrobat are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0291 | CVE-2015-3058 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerability in which important information is obtained from process memory |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to obtain sensitive information from process memory via unspecified vectors. This vulnerability allows remote attackers to leak memory addresses from Spell.api on vulnerable installations of Adobe Acrobat Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the Spell object. By creating and exporting a custom dictionary, it is possible to leak memory addresses from Spell.api. An attacker can leverage this vulnerability to disclose arbitrary memory. Adobe Acrobat and Reader are prone to an information-disclosure vulnerability.
An attacker can exploit this issue to gain access to sensitive information that may aid in further attacks. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0292 | CVE-2015-3059 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3053, CVE-2015-3054, CVE-2015-3055, and CVE-2015-3075. This vulnerability CVE-2015-3053 , CVE-2015-3054 , CVE-2015-3055 ,and CVE-2015-3075 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Text Annotations. A specially crafted Text Annotation can force a dangling pointer to be reused after it has been freed. Failed exploit attempts will likely result in denial-of-service conditions. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0290 | CVE-2015-3057 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-9161, CVE-2015-3046, CVE-2015-3049, CVE-2015-3050, CVE-2015-3051, CVE-2015-3052, CVE-2015-3056, CVE-2015-3070, and CVE-2015-3076. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Doc objects. The issue lies in the failure to properly initialize a variable prior to using it, leading to memory corruption. Adobe Reader and Acrobat are prone to multiple memory-corruption vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0285 | CVE-2015-3076 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-9161, CVE-2015-3046, CVE-2015-3049, CVE-2015-3050, CVE-2015-3051, CVE-2015-3052, CVE-2015-3056, CVE-2015-3057, and CVE-2015-3070. Adobe Reader and Acrobat are prone to multiple memory-corruption vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0284 | CVE-2015-3075 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3053, CVE-2015-3054, CVE-2015-3055, and CVE-2015-3059. This vulnerability CVE-2015-3053 , CVE-2015-3054 , CVE-2015-3055 ,and CVE-2015-3059 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Adobe Reader and Acrobat are prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool. The following products and versions are affected: Adobe Reader 10.1.13 and earlier and 11.0.10 and earlier, Acrobat 10.1.13 and earlier and 11.0.10 and earlier
| VAR-201505-0288 | CVE-2015-3079 | Adobe Flash Player and Adobe AIR Vulnerabilities bypassing access restrictions |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
(CVE-2015-3091, CVE-2015-3092)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.460.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0289 | CVE-2015-3080 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
(CVE-2015-3091, CVE-2015-3092)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.460.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0287 | CVE-2015-3078 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3089, CVE-2015-3090, and CVE-2015-3093. This vulnerability CVE-2015-3089 , CVE-2015-3090 , CVE-2015-3093 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0286 | CVE-2015-3077 | Adobe Flash Player and Adobe AIR Vulnerabilities in arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3084 and CVE-2015-3086. This vulnerability is CVE-2015-3084 and CVE-2015-3086 This is a different vulnerability. Supplementary information : CWE Vulnerability types by CWE-843:Access of Resource Using Incompatible Type ( Wrong mix of types ) Has been identified. http://cwe.mitre.org/data/definitions/843.htmlBy the attacker, unspecified " Wrong mix of types (type confusion)" By using, arbitrary code may be executed.
Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
(CVE-2015-3091, CVE-2015-3092)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.460.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0282 | CVE-2015-3087 | Adobe Flash Player and Adobe AIR Integer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Integer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0281 | CVE-2015-3086 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3077 and CVE-2015-3084. This vulnerability CVE-2015-3077 and CVE-2015-3084 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-843:Access of Resource Using Incompatible Type ( Mixing of molds ) Has been identified. http://cwe.mitre.org/data/definitions/843.htmlUnspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
(CVE-2015-3091, CVE-2015-3092)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.460.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0276 | CVE-2015-3081 | Adobe Flash Player and Adobe AIR In Internet Explorer Vulnerabilities that bypass protection mode protection mechanisms |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Race condition in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allows attackers to bypass the Internet Explorer Protected Mode protection mechanism via unspecified vectors. Adobe Flash Player and AIR are prone to an unspecified security-bypass vulnerability.
Attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. A race condition vulnerability exists in several Adobe products. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201505-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Adobe Flash Player: Multiple vulnerabilities
Date: May 31, 2015
Bugs: #549388
ID: 201505-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-plugins/adobe-flash < 11.2.202.460 >= 11.2.202.460
Description
===========
Multiple vulnerabilities have been discovered in Adobe Flash Player.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0283 | CVE-2015-3088 | Adobe Flash Player and Adobe AIR Heap-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
(CVE-2015-3091, CVE-2015-3092)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.460.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0278 | CVE-2015-3083 | Adobe Flash Player and Adobe AIR Vulnerability that can circumvent restrictions on file system write operations |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3085. This vulnerability CVE-2015-3082 and CVE-2015-3085 Is a different vulnerability.A third party may be able to circumvent restrictions on write operations on the file system.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5