VARIoT IoT vulnerabilities database
| VAR-201505-0219 | CVE-2015-1880 | Fortinet FortiOS of sslvpn Login page cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the sslvpn login page in Fortinet FortiOS 5.2.x before 5.2.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Fortinet FortiOS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Fortinet FortiOS is a set of security operating systems developed by Fortinet Corporation for the FortiGate network security platform. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSL VPN, Web content filtering and anti-spam
| VAR-201505-0277 | CVE-2015-3082 | Adobe Flash Player and Adobe AIR Vulnerability that can circumvent restrictions on file system write operations |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3083 and CVE-2015-3085. This vulnerability CVE-2015-3083 and CVE-2015-3085 Is a different vulnerability.A third party may be able to circumvent restrictions on write operations on the file system.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0210 | CVE-2014-9160 | Windows and Mac OS X Run on Adobe Reader and Acrobat Heap-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Multiple heap-based buffer overflows in Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to execute arbitrary code via unknown vectors.
Attackers can exploit these issues to execute arbitrary code within the context of the affected application. Failed exploit attempts likely result in denial-of-service conditions.
The affected products are:
Adobe Reader 11.x versions prior to 11.0.11
Adobe Reader 10.x versions prior to 10.1.14
Adobe Acrobat 11.x versions prior to 11.0.11
Adobe Acrobat 10.x versions prior to 10.1.14. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool
| VAR-201505-0279 | CVE-2015-3084 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3077 and CVE-2015-3086. This vulnerability CVE-2015-3077 and CVE-2015-3086 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-843:Access of Resource Using Incompatible Type ( Mixing of molds ) Has been identified. http://cwe.mitre.org/data/definitions/843.htmlUnspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
(CVE-2015-3091, CVE-2015-3092)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.460.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0280 | CVE-2015-3085 | Adobe Flash Player and Adobe AIR Vulnerability that can circumvent restrictions on file system write operations |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3083. This vulnerability CVE-2015-3082 and CVE-2015-3083 Is a different vulnerability.A third party may be able to circumvent restrictions on write operations on the file system. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the BrokerCreateFile method. An attacker can force BrokerCreateFile to traverse the path of the output file, allowing the file to be written anywhere on disk. An attacker can leverage this vulnerability to execute code at medium integrity.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0141 | CVE-2015-2234 | Lenovo System Update Vulnerable to gaining privileges |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
Race condition in Lenovo System Update (formerly ThinkVantage System Update) before 5.06.0034 uses world-writable permissions for the update files directory, which allows local users to gain privileges by writing to an update file after the signature is validated. Lenovo System Update is prone to a local privilege-escalation vulnerability.
A local attacker can exploit this vulnerability to gain elevated privileges.
Lenovo System Update 5.6.0.27 and prior versions are vulnerable. Lenovo System Update (formerly known as ThinkVantage System Update) is a set of system automatic update tools provided by China Lenovo (Lenovo), which includes device driver updates, Windows system patch updates, etc
| VAR-201505-0088 | CVE-2015-3092 | Adobe Flash Player and Adobe AIR In ASLR Vulnerabilities bypassing protection mechanisms |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3091. This vulnerability is CVE-2015-3091 This is a different vulnerability.By the attacker, ASLR Protection mechanisms could be bypassed.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0087 | CVE-2015-3091 | Adobe Flash Player and Adobe AIR In ASLR Vulnerabilities that circumvent protection mechanisms |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3092. This vulnerability CVE-2015-3092 Is a different vulnerability.By the attacker, ASLR Protection mechanisms may be bypassed.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0089 | CVE-2015-3093 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3090. This vulnerability CVE-2015-3078 , CVE-2015-3089 , CVE-2015-3090 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0086 | CVE-2015-3090 | Adobe Flash Player and Adobe AIR Vulnerabilities in arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3093. This vulnerability is CVE-2015-3078 , CVE-2015-3089 ,and CVE-2015-3093 This is a different vulnerability.Arbitrary code execution or denial of service by an attacker ( Memory corruption ) May be in a state.
An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0085 | CVE-2015-3089 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3090, and CVE-2015-3093. This vulnerability CVE-2015-3078 , CVE-2015-3090 ,and CVE-2015-3093 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1005-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html
Issue date: 2015-05-13
CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079
CVE-2015-3080 CVE-2015-3082 CVE-2015-3083
CVE-2015-3084 CVE-2015-3085 CVE-2015-3086
CVE-2015-3087 CVE-2015-3088 CVE-2015-3089
CVE-2015-3090 CVE-2015-3091 CVE-2015-3092
CVE-2015-3093
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,
CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,
CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)
A security bypass flaw was found in flash-plugin that could lead to the
disclosure of sensitive information. (CVE-2015-3079)
Two memory information leak flaws were found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09
1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09)
1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.460-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.460-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.460-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3077
https://access.redhat.com/security/cve/CVE-2015-3078
https://access.redhat.com/security/cve/CVE-2015-3079
https://access.redhat.com/security/cve/CVE-2015-3080
https://access.redhat.com/security/cve/CVE-2015-3082
https://access.redhat.com/security/cve/CVE-2015-3083
https://access.redhat.com/security/cve/CVE-2015-3084
https://access.redhat.com/security/cve/CVE-2015-3085
https://access.redhat.com/security/cve/CVE-2015-3086
https://access.redhat.com/security/cve/CVE-2015-3087
https://access.redhat.com/security/cve/CVE-2015-3088
https://access.redhat.com/security/cve/CVE-2015-3089
https://access.redhat.com/security/cve/CVE-2015-3090
https://access.redhat.com/security/cve/CVE-2015-3091
https://access.redhat.com/security/cve/CVE-2015-3092
https://access.redhat.com/security/cve/CVE-2015-3093
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-09.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk
hCnlu6h8oa0dBCAE87w7uSg=
=Ph69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"
References
==========
[ 1 ] CVE-2015-3044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044
[ 2 ] CVE-2015-3077
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077
[ 3 ] CVE-2015-3078
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078
[ 4 ] CVE-2015-3079
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079
[ 5 ] CVE-2015-3080
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080
[ 6 ] CVE-2015-3081
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081
[ 7 ] CVE-2015-3082
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082
[ 8 ] CVE-2015-3083
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083
[ 9 ] CVE-2015-3084
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084
[ 10 ] CVE-2015-3085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085
[ 11 ] CVE-2015-3086
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086
[ 12 ] CVE-2015-3087
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087
[ 13 ] CVE-2015-3088
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088
[ 14 ] CVE-2015-3089
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089
[ 15 ] CVE-2015-3090
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090
[ 16 ] CVE-2015-3091
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091
[ 17 ] CVE-2015-3092
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092
[ 18 ] CVE-2015-3093
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201505-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201505-0140 | CVE-2015-2233 | Lenovo System Update Vulnerable to uploading arbitrary files |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
Lenovo System Update (formerly ThinkVantage System Update) before 5.06.0034 does not properly validate CA chains during signature validation, which allows man-in-the-middle attackers to upload and execute arbitrary files via a crafted certificate. Lenovo System Update is prone to a security-bypass vulnerability.
Attackers can exploit this issue through man-in-the-middle attacks to execute arbitrary code, which may lead to further attacks.
Versions prior to Lenovo System Update 5.6.0.27 are vulnerable. Lenovo System Update (formerly known as ThinkVantage System Update) is a set of system automatic update tools provided by China Lenovo (Lenovo), which includes device driver updates, Windows system patch updates, etc. The vulnerability stems from the fact that the program does not verify the CA chain correctly when performing signature verification operations
| VAR-201505-0488 | No CVE | G-Homa WLan Power Plug has multiple vulnerabilities |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
G-Homa WLan Power Plug is a wireless LAN power plug.
An authentication bypass vulnerability and a security bypass vulnerability exist in the G-Homa WLan Power Plug. A remote attacker could use these vulnerabilities to bypass authentication mechanisms, gain unauthorized access, perform unauthorized operations, or gain access to sensitive information
| VAR-201505-0145 | CVE-2015-2122 | HP SDN VAN Controller Run on device REST Service disruption at the layer (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The REST layer on HP SDN VAN Controller devices 2.5 and earlier allows remote attackers to cause a denial of service via network traffic to the REST port. HP SDN VAN Controller is prone to an unspecified denial-of-service vulnerability.
A remote attacker can leverage this issue to cause denial-of-service condition.
HP SDN VAN Controller 2.5 and prior are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04657823
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04657823
Version: 1
HPSBGN03329 rev.1 - HP SDN VAN Controller, Remote Denial of Service (DoS),
Distributed Denial of Service (DDoS)
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
References:
CVE-2014-0050 Remote Denial of Service (DoS)
CVE-2015-2122 Remote Distributed Denial of Service (DDoS)
SSRT102049
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-0050 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2015-2122 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP recommends either of the two following workarounds for the vulnerabilities
in the HP SDN VAN Controller. For example: the
Microsoft Lync Server for Optimizer.
For more detailed information, please refer to the "Securing REST layer
Access on HP VAN SDN Controllers" article at the following location:
http://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=em
r_na-c04676756
HISTORY
Version:1 (rev.1) - 11 May 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
iEYEARECAAYFAlVQ3n0ACgkQ4B86/C0qfVleJgCg+qPCFTzdKRL5cLe4eNH7Q82V
w80AoOpSvjMM19ssS++abLKV1S+kypwk
=Wtwj
-----END PGP SIGNATURE-----
| VAR-201505-0135 | CVE-2015-0717 | Cisco Unified Communications Manager Vulnerability gained in |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
Cisco Unified Communications Manager 10.0(1.10000.12) allows local users to gain privileges via a command string in an unspecified parameter, aka Bug ID CSCut19546. Cisco Unified Communications Manager Contains a privileged vulnerability.
Local attackers can exploit this issue to gain root privileges. Successful exploits will result in the complete compromise of affected computers.
This issue is being tracked by Cisco Bug ID CSCut19546. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution. A security vulnerability exists in CUCM version 10.0 (1.10000.12), which is caused by the program not adequately filtering user-submitted input
| VAR-201505-0170 | CVE-2015-0723 | Cisco Wireless LAN Controller Device wireless web Service disruption in the authentication subsystem (DoS) Vulnerabilities |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
The wireless web-authentication subsystem on Cisco Wireless LAN Controller (WLC) devices 7.5.x and 7.6.x before 7.6.120 allows remote attackers to cause a denial of service (process crash and device restart) via a crafted value, aka Bug ID CSCum03269. The Cisco Wireless LAN Controller is used to manage Cisco Aironet access point applications using the Lightweight Access Point Protocol (LWAPP).
Attackers can exploit this issue to crash and restart the affected device, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCum03269. This product provides functions such as security policy and intrusion detection in wireless LAN
| VAR-201505-0376 | CVE-2015-3610 | Siemens HomeControl for Room Automation for Android SSL Certificate man-in-the-middle attack vulnerability |
CVSS V2: 5.4 CVSS V3: - Severity: MEDIUM |
The Siemens HomeControl for Room Automation application before 2.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information or modify data via a crafted certificate. Siemens HomeControl for Room Automation for Android is an Android-based in-house automation control software. The software supports remote control of indoor heating, ventilation and air conditioning systems, etc. The vulnerability stems from the fact that the program does not verify the X.509 certificate from the SSL server
| VAR-201505-0079 | CVE-2015-1156 | Apple Safari Used in etc. WebKit Page load implementation vulnerable to bypass same-origin policy for link targets |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The page-loading implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, does not properly handle the rel attribute in an A element, which allows remote attackers to bypass the Same Origin Policy for a link's target, and spoof the user interface, via a crafted web site. Apple Safari Used in etc. WebKit is prone to a URI-spoofing vulnerability.
Attackers may exploit this issue to display arbitrary content with a spoofed URI and obtain potentially sensitive information. Successfully exploiting this issue may aid in phishing attacks. Apple Safari is a web browser of Apple (Apple), the default browser included with Mac OS X and iOS operating systems. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. A security vulnerability exists in the page loading implementation of WebKit used in Apple Safari. The vulnerability stems from the program not properly handling the rel attribute in the A element. The following versions are affected: Apple Safari prior to 6.2.6, 7.x prior to 7.1.6, and 8.x prior to 8.0.6. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2015-06-30-1 iOS 8.4
iOS 8.4 is now available and addresses the following:
Application Store
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious universal provisioning profile app may prevent
apps from launching
Description: An issue existed in the install logic for universal
provisioning profile apps, which allowed a collision to occur with
existing bundle IDs. This issue was addressed through improved
collision checking.
CVE-ID
CVE-2015-3722 : Zhaofeng Chen, Hui Xue, and Tao (Lenx) Wei from
FireEye, Inc.
Certificate Trust Policy
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker with a privileged network position may be able
to intercept network traffic
Description: An intermediate certificate was incorrectly issued by
the certificate authority CNNIC. This issue was addressed through the
addition of a mechanism to trust only a subset of certificates issued
prior to the mis-issuance of the intermediate. Further details are
available at https://support.apple.com/en-us/HT204938
Certificate Trust Policy
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Update to the certificate trust policy
Description: The certificate trust policy was updated. The complete
list of certificates may be viewed at https://support.apple.com/en-
us/HT204132
CFNetwork HTTPAuthentication
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Following a maliciously crafted URL may lead to arbitrary
code execution
Description: A memory corruption issue existed in handling of
certain URL credentials. This issue was addressed with improved
memory handling.
CVE-ID
CVE-2015-3684 : Apple
CoreGraphics
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Opening a maliciously crafted PDF file may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in the
handling of ICC profiles. These issues were addressed through
improved memory handling.
CVE-ID
CVE-2015-3723 : chaithanya (SegFault) working with HP's Zero Day
Initiative
CVE-2015-3724 : WanderingGlitch of HP's Zero Day Initiative
CoreText
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Processing a maliciously crafted text file may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in the
processing of text files. These issues were addressed through
improved bounds checking.
CVE-ID
CVE-2015-1157
CVE-2015-3685 : Apple
CVE-2015-3686 : John Villamil (@day6reak), Yahoo Pentest Team
CVE-2015-3687 : John Villamil (@day6reak), Yahoo Pentest Team
CVE-2015-3688 : John Villamil (@day6reak), Yahoo Pentest Team
CVE-2015-3689 : Apple
coreTLS
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker with a privileged network position may intercept
SSL/TLS connections
Description: coreTLS accepted short ephemeral Diffie-Hellman (DH)
keys, as used in export-strength ephemeral DH cipher suites. This
issue, also known as Logjam, allowed an attacker with a privileged
network position to downgrade security to 512-bit DH if the server
supported an export-strength ephemeral DH cipher suite. The issue was
addressed by increasing the default minimum size allowed for DH
ephemeral keys to 768 bits.
CVE-ID
CVE-2015-4000 : The weakdh team at weakdh.org, Hanno Boeck
DiskImages
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application may be able to determine kernel
memory layout
Description: An information disclosure issue existed in the
processing of disk images. This issue was addressed through improved
memory management.
CVE-ID
CVE-2015-3690 : Peter Rutenbar working with HP's Zero Day Initiative
FontParser
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Processing a maliciously crafted font file may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in the
processing of font files. These issues were addressed through
improved input validation.
CVE-ID
CVE-2015-3694 : John Villamil (@day6reak), Yahoo Pentest Team
CVE-2015-3719 : John Villamil (@day6reak), Yahoo Pentest Team
ImageIO
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Processing a maliciously crafted .tiff file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in the processing of
.tiff files. This issue was addressed with improved bounds checking.
CVE-ID
CVE-2015-3703 : Apple
ImageIO
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Multiple vulnerabilities exist in libtiff, the most serious
of which may lead to arbitrary code execution
Description: Multiple vulnerabilities existed in libtiff versions
prior to 4.0.4. They were addressed by updating libtiff to version
4.0.4.
CVE-ID
CVE-2014-8127
CVE-2014-8128
CVE-2014-8129
CVE-2014-8130
Kernel
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application may be able to determine kernel
memory layout
Description: A memory management issue existed in the handling of
HFS parameters which could have led to the disclosure of kernel
memory layout. This issue was addressed through improved memory
management.
CVE-ID
CVE-2015-3721 : Ian Beer of Google Project Zero
Mail
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A maliciously crafted email can replace the message content
with an arbitrary webpage when the message is viewed
Description: An issue existed in the support for HTML email which
allowed message content to be refreshed with an arbitrary webpage.
The issue was addressed through restricted support for HTML content.
CVE-ID
CVE-2015-3710 : Aaron Sigel of vtty.com, Jan Soucek
MobileInstallation
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious universal provisioning profile app can prevent a
Watch app from launching
Description: An issue existed in the install logic for universal
provisioning profile apps on the Watch which allowed a collision to
occur with existing bundle IDs. This issue was addressed through
improved collision checking.
CVE-ID
CVE-2015-3725 : Zhaofeng Chen, Hui Xue, and Tao (Lenx) Wei from
FireEye, Inc.
Safari
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may compromise user
information on the filesystem
Description: A state management issue existed in Safari that allowed
unprivileged origins to access contents on the filesystem. This issue
was addressed through improved state management.
CVE-ID
CVE-2015-1155 : Joe Vennix of Rapid7 Inc. working with HP's Zero Day
Initiative
Safari
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to account
takeover
Description: An issue existed where Safari would preserve the Origin
request header for cross-origin redirects, allowing malicious
websites to circumvent CSRF protections. The issue was addressed
through improved handling of redirects.
CVE-ID
CVE-2015-3658 : Brad Hill of Facebook
Security
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A remote attacker may cause an unexpected application
termination or arbitrary code execution
Description: An integer overflow existed in the Security framework
code for parsing S/MIME e-mail and some other signed or encrypted
objects. This issue was addressed through improved validity checking.
CVE-ID
CVE-2013-1741
SQLite
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A remote attacker may cause an unexpected application
termination or arbitrary code execution
Description: Multiple buffer overflows existed in SQLite's printf
implementation. These issues were addressed through improved bounds
checking.
CVE-ID
CVE-2015-3717 : Peter Rutenbar working with HP's Zero Day Initiative
Telephony
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Maliciously crafted SIM cards may lead to arbitrary code
execution
Description: Multiple input validation issues existed in the parsing
of SIM/UIM payloads. These issues were addressed through improved
payload validation.
CVE-ID
CVE-2015-3726 : Matt Spisak of Endgame
WebKit
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a malicious website by clicking a link may lead to
user interface spoofing
Description: An issue existed in the handling of the rel attribute
in anchor elements. Target objects could get unauthorized access to
link objects. This issue was addressed through improved link type
adherence.
CVE-ID
CVE-2015-1156 : Zachary Durber of Moodle
WebKit
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-1152 : Apple
CVE-2015-1153 : Apple
WebKit
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted webpage may lead to an
unexpected application termination or arbitrary code execution
Description: An insufficient comparison issue existed in SQLite
authorizer which allowed invocation of arbitrary SQL functions. This
issue was addressed with improved authorization checks.
CVE-ID
CVE-2015-3659 : Peter Rutenbar working with HP's Zero Day Initiative
WebKit
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A maliciously crafted website can access the WebSQL
databases of other websites
Description: An issue existed in the authorization checks for
renaming WebSQL tables which could have allowed a maliciously crafted
website to access databases belonging to other websites. This was
addressed through improved authorization checks.
CVE-ID
CVE-2015-3727 : Peter Rutenbar working with HP's Zero Day Initiative
WiFi Connectivity
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: iOS devices may auto-associate with untrusted access points
advertising a known ESSID but with a downgraded security type
Description: An insufficient comparison issue existed in WiFi
manager's evaluation of known access point advertisements. This issue
was addressed through improved matching of security parameters.
CVE-ID
CVE-2015-3728 : Brian W. Gray of Carnegie Mellon University, Craig
Young from TripWire
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "8.4".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2
Comment: GPGTools - http://gpgtools.org
iQIcBAEBCAAGBQJVkr+6AAoJEBcWfLTuOo7tfDwP/1db2KLgQP+Pyb6av5awgS4m
hQul1ihU0JO8jAI2ww345v6jMFq7MIAs82DobbRwqtI97aTep5bieqr5qUautlFz
NtC4VQ5PsAyEoTo0cOSpvFOV3av6BdwFeNTI4w39n+bvKn6YUSJD0zswknUtI/G7
lpFx/KxvKBkXBhWWCg3cyVlo3Jap88svlyh9MZ+C0BYFyjZ+ZjYMlDZ6FdzRyBxI
4RHaXUFrtMQk3JAeIadSbevOH2mUwlCB9vDmFOC5BFTrMYV8nd3gyXMy924wLQli
l3gtx+Kgq3+i71Zay7HGmshv06vZop8X82fC/lNZmTQFfNABLLug0ve0tLH9+IRm
516Yb4UxUZ51Pnhbv1wvwqATGoJpK4oFXHsTx0rCVpkcxGMLmeYRyaxQYBUzh+ns
+9tcuqIBsvVudY8LGAF4yUxkmt2K5N6mqu9x+KqVmiI9M7DbBoc+AUNVJpoiEGmt
qB/eqkpGYKvHal3UEV6P3sSM3gBrzb5aFYNa8R31/cE8U+INeKTwd99KNoixJa9y
/rNOSnuwKsuD33NFUpOJo/MW70ts3BrjN8eIvtnZ7/GHVljkQde7LCCJ2k2iQWTW
lp+C5jWsR/2qXoCkG1p2oipBP/2OKo9wRzklkOo+1LJiWY18r/FlRMWqfkFUyMrK
+NEpxWhe8ytzIFIkrXDt
=iv++
-----END PGP SIGNATURE-----
| VAR-201505-0101 | CVE-2015-2829 | Citrix NetScaler Application Delivery Controller and NetScaler Gateway Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 10.5 Build 53.9 through 55.8 and 10.5.e Build 53-9010.e allow remote attackers to cause a denial of service (reboot) via unspecified vectors.
An attacker can exploit this issue to reboot the appliance, resulting in denial-of-service conditions
| VAR-201505-0129 | CVE-2015-0701 | Cisco Unified Computing System Central Software Arbitrary Command Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Cisco UCS Central Software before 1.3(1a) allows remote attackers to execute arbitrary commands via a crafted HTTP request, aka Bug ID CSCut46961.
An attacker can exploit this issue to execute system commands on the underlying operating system.
This issue being tracked by Cisco Bug ID CSCut46961