VARIoT IoT vulnerabilities database
| VAR-201506-0003 | CVE-2012-4716 | N-Tron 702-W Industrial Wireless Access Point Vulnerabilities that break cryptographic protection mechanisms in devices |
CVSS V2: 8.8 CVSS V3: - Severity: HIGH |
N-Tron 702-W Industrial Wireless Access Point devices use the same (1) SSH and (2) HTTPS private keys across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a key. Spectris N-Tron 702-W Industrial Wireless Access Point devices are wireless access point devices. Allow remote attackers to obtain sensitive information through known keys or to gain unauthorized access.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks
| VAR-201506-0354 | CVE-2015-3949 | Sinapsi eSolar Light Vulnerability in obtaining plaintext password in firmware |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Sinapsi eSolar Light with firmware before 2.0.3970_schsl_2.2.85 allows attackers to discover cleartext passwords by reading the HTML source code of the mail-configuration page. Sinapsi eSolar Light is prone to a local information-disclosure vulnerability.
Local attackers can exploit this issue to obtain sensitive information such as saved passwords that may aid in launching further attacks. Sinapsi eSolar Light is a monitoring system for use in solar applications by the Italian company Sinapsi. A security vulnerability exists in the Sinapsi eSolar Light with firmware versions prior to 2.0.3970_schsl_2.2.85
| VAR-201506-0160 | CVE-2015-0768 | Cisco Prime Network Control System of Device Work Center Vulnerabilities that prevent access restrictions on components |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
The Device Work Center (DWC) component in Cisco Prime Network Control System (NCS) 2.1(0.0.85), 2.2(0.0.58), and 2.2(0.0.69) does not properly implement AAA roles, which allows remote authenticated users to bypass intended access restrictions and execute commands via a login session, aka Bug ID CSCur27371. Cisco Prime Network Control System is prone to an unauthorized-access vulnerability.
Attackers can exploit this issue to gain unauthorized access to the affected application. This may aid in further attacks.
This issue is being tracked by Cisco bug ID CSCur27371. Device Work Center (DWC) is one of the monitoring and fault diagnosis components. The following releases are affected: Cisco Prime NCS Release 2.1(0.0.85), Release 2.2(0.0.58), Release 2.2(0.0.69)
| VAR-201506-0164 | CVE-2015-0772 | Cisco TelePresence Video Communication Server Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco TelePresence Video Communication Server (VCS) X8.5RC4 allows remote attackers to cause a denial of service (CPU consumption or device outage) via a crafted SDP parameter-negotiation request in an SDP session during a SIP connection, aka Bug ID CSCut42422.
An attacker can exploit this issue to cause a denial of service condition, denying service to legitimate users.
This issue is being tracked by Cisco bug ID CSCut42422
| VAR-201506-0165 | CVE-2015-0773 | Cisco FireSIGHT system Vulnerability to delete arbitrary user's dashboard in software |
CVSS V2: 5.5 CVSS V3: - Severity: MEDIUM |
Cisco FireSIGHT System Software 5.3.1.3 and 6.0.0 allows remote authenticated users to delete an arbitrary user's dashboard via a modified VPN deletion request in a management session, aka Bug ID CSCut67078. Cisco FireSIGHT system The software contains a vulnerability that allows arbitrary user dashboards to be deleted. The Cisco FireSIGHT ManagementCenter is a set of network security and operations that support centralized management of Cisco ASA and Cisco FirePOWER network security appliances using FirePOWER Services. The Cisco FireSIGHT Management Center has security issues. Remotely authenticated non-privileged users submit special VPN removal requests and delete the user's VPN panel. Cisco FireSIGHT System Software is prone to a remote security-bypass vulnerability.
Successfully exploiting this issue may allow an attacker to to delete the VPN dashboard of a targeted user. This may result in a denial of service condition.
This issue is being tracked by Cisco Bug ID CSCut67078
| VAR-201506-0166 | CVE-2015-0774 | Cisco Application and Content Networking System Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Cisco Application and Content Networking System (ACNS) 5.5(9) allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuu70650.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCuu70650
| VAR-201506-0088 | CVE-2015-3104 | Adobe Flash Player and Adobe AIR Integer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Integer overflow in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3100, CVE-2015-3103, CVE-2015-3104, CVE-2015-3105,
CVE-2015-3106, CVE-2015-3107)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0087 | CVE-2015-3103 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3106 and CVE-2015-3107. Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary code execution vulnerabilities. This vulnerability CVE-2015-3106 and CVE-2015-3107 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Flash Player, Adobe AIR SDK and Adobe AIR SDK & Compiler are all products of American Adobe (Adobe). A use-after-free vulnerability exists in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3100, CVE-2015-3103, CVE-2015-3104, CVE-2015-3105,
CVE-2015-3106, CVE-2015-3107)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
(CVE-2015-3108)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.466.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0085 | CVE-2015-3101 | Adobe Flash Player and Adobe AIR of Flash Broker integrity level "Low" From "During" Vulnerabilities migrated to |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The Flash broker in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, when Internet Explorer is used, allows attackers to perform a transition from Low Integrity to Medium Integrity via unspecified vectors. This vulnerability CVE-2015-3098 and CVE-2015-3102 Is a different vulnerability.An attacker could move the integrity level from low to medium.
Attackers can exploit this issue to gain elevated privileges within the application.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201506-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Adobe Flash Player: Multiple vulnerabilities
Date: June 21, 2015
Bugs: #551658
ID: 201506-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-plugins/adobe-flash < 11.2.202.466 >= 11.2.202.466
Description
===========
Multiple vulnerabilities have been discovered in Adobe Flash Player.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0086 | CVE-2015-3102 | Adobe Flash Player and Adobe AIR Vulnerabilities that bypass the same origin policy |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3099. Adobe Flash Player and Adobe AIR Contains a vulnerability that bypasses the same origin policy. This vulnerability CVE-2015-3098 and CVE-2015-3099 Is a different vulnerability.A third party can bypass the same origin policy.
An attacker can exploit these issues to bypass certain same-origin policy restrictions and to access sensitive information, which may aid in further attacks. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0084 | CVE-2015-3100 | Adobe Flash Player and Adobe AIR Vulnerable to stack-based buffer overflow |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3100, CVE-2015-3103, CVE-2015-3104, CVE-2015-3105,
CVE-2015-3106, CVE-2015-3107)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
(CVE-2015-3108)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.466.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0083 | CVE-2015-3099 | Adobe Flash Player and Adobe AIR Vulnerabilities that bypass the same origin policy |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3102. Adobe Flash Player and Adobe AIR Contains a vulnerability that bypasses the same origin policy. This vulnerability CVE-2015-3098 and CVE-2015-3102 Is a different vulnerability.A third party can bypass the same origin policy.
An attacker can exploit these issues to bypass certain same-origin policy restrictions and to access sensitive information, which may aid in further attacks. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0082 | CVE-2015-3098 | Adobe Flash Player and Adobe AIR Vulnerabilities that bypass the same origin policy |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3099 and CVE-2015-3102. Adobe Flash Player and Adobe AIR Contains a vulnerability that bypasses the same origin policy. This vulnerability CVE-2015-3099 and CVE-2015-3102 Is a different vulnerability.A third party can bypass the same origin policy.
An attacker can exploit these issues to bypass certain same-origin policy restrictions and to access sensitive information, which may aid in further attacks. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0080 | CVE-2015-3096 | Adobe Flash Player and Adobe AIR In CVE-2014-5333 Vulnerabilities that bypass the protection mechanism |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass a CVE-2014-5333 protection mechanism via unspecified vectors. Adobe Flash Player and Adobe AIR Is CVE-2014-5333 A vulnerability exists that bypasses the protection mechanism.By a third party CVE-2014-5333 Protection mechanisms may be bypassed.
Attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Security flaws exist in several Adobe products. An attacker could exploit this vulnerability to bypass the cross-site request forgery protection mechanism. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3100, CVE-2015-3103, CVE-2015-3104, CVE-2015-3105,
CVE-2015-3106, CVE-2015-3107)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0072 | CVE-2015-3106 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3107. Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary code execution vulnerabilities. This vulnerability CVE-2015-3103 and CVE-2015-3107 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Flash Player, Adobe AIR SDK and Adobe AIR SDK & Compiler are all products of American Adobe (Adobe). A use-after-free vulnerability exists in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3100, CVE-2015-3103, CVE-2015-3104, CVE-2015-3105,
CVE-2015-3106, CVE-2015-3107)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
(CVE-2015-3108)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.466.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0074 | CVE-2015-3108 | Adobe Flash Player and Adobe AIR In ASLR Vulnerabilities that circumvent protection mechanisms |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors. Adobe Flash Player and Adobe AIR Does not properly limit memory address detection, ASLR A vulnerability exists that bypasses the protection mechanism.By the attacker, ASLR Protection mechanisms may be bypassed.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Attackers can exploit this vulnerability to bypass the established ASLR protection mechanism and take control of the affected system. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3100, CVE-2015-3103, CVE-2015-3104, CVE-2015-3105,
CVE-2015-3106, CVE-2015-3107)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0071 | CVE-2015-3105 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. Adobe Flash Player and AIR are prone to an unspecified memory-corruption vulnerability.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3100, CVE-2015-3103, CVE-2015-3104, CVE-2015-3105,
CVE-2015-3106, CVE-2015-3107)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0073 | CVE-2015-3107 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3106. Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary code execution vulnerabilities. This vulnerability CVE-2015-3103 and CVE-2015-3106 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Flash Player, Adobe AIR SDK and Adobe AIR SDK & Compiler are all products of American Adobe (Adobe). A use-after-free vulnerability exists in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1086-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1086.html
Issue date: 2015-06-10
CVE Names: CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
CVE-2015-3107 CVE-2015-3108
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-11
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2015-3100, CVE-2015-3103, CVE-2015-3104, CVE-2015-3105,
CVE-2015-3106, CVE-2015-3107)
Multiple security bypass flaws were found in flash-plugin that could lead
to the disclosure of sensitive information. (CVE-2015-3096, CVE-2015-3098,
CVE-2015-3099, CVE-2015-3102)
A memory information leak flaw was found in flash-plugin that could
allow an attacker to potentially bypass ASLR (Address Space Layout
Randomization) protection, and make it easier to exploit other flaws.
(CVE-2015-3108)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.466.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1229879 - CVE-2015-3100 CVE-2015-3103 CVE-2015-3104 CVE-2015-3105 CVE-2015-3106 CVE-2015-3107 flash-plugin: multiple code execution issues fixed in APSB15-11
1230185 - CVE-2015-3096 flash-plugin: cross-site request forgery against JSONP endpoints fixed in APSB15-11 (incomplete fix for CVE-2014-5333)
1230189 - CVE-2015-3098 CVE-2015-3099 CVE-2015-3102 flash-plugin: same-origin-policy bypass fixed in APSB15-11
1230201 - CVE-2015-3108 flash-plugin: information leak leading to ASLR bypass (APSB15-11)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.466-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.466-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.466-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3096
https://access.redhat.com/security/cve/CVE-2015-3098
https://access.redhat.com/security/cve/CVE-2015-3099
https://access.redhat.com/security/cve/CVE-2015-3100
https://access.redhat.com/security/cve/CVE-2015-3102
https://access.redhat.com/security/cve/CVE-2015-3103
https://access.redhat.com/security/cve/CVE-2015-3104
https://access.redhat.com/security/cve/CVE-2015-3105
https://access.redhat.com/security/cve/CVE-2015-3106
https://access.redhat.com/security/cve/CVE-2015-3107
https://access.redhat.com/security/cve/CVE-2015-3108
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-11.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVeE7EXlSAg2UNWIIRAlOpAJ9RuYMo4MW/E5iT60nzKf7DrOrZjwCgoZXa
u416jfOUFziDYbxIZyHYjaI=
=EMNe
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.466"
References
==========
[ 1 ] CVE-2015-3096
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096
[ 2 ] CVE-2015-3097
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097
[ 3 ] CVE-2015-3098
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098
[ 4 ] CVE-2015-3099
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099
[ 5 ] CVE-2015-3100
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100
[ 6 ] CVE-2015-3101
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101
[ 7 ] CVE-2015-3102
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102
[ 8 ] CVE-2015-3103
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103
[ 9 ] CVE-2015-3104
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104
[ 10 ] CVE-2015-3105
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105
[ 11 ] CVE-2015-3106
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106
[ 12 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 13 ] CVE-2015-3108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108
[ 14 ] CVE-2015-4472
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201506-0054 | CVE-2014-4875 | Toshiba CHEC Hardcoded Cryptographic Key Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
CreateBossCredentials.jar in Toshiba CHEC before 6.6 build 4014 and 6.7 before build 4329 contains a hardcoded AES key, which allows attackers to discover Back Office System Server (BOSS) DB2 database credentials by leveraging knowledge of this key in conjunction with bossinfo.pro read access. Toshiba CHEC Is AES There is a problem where the common key is hard-coded. The encryption key is hard-coded (CWE-321) - CVE-2014-4875 Toshiba CHEC of CreateBossCredentials.jar Used for encryption AES There is a problem where the common key is hard-coded. bossinfo.pro An attacker with access to the file was hard-coded AES Using a common key, BOSS It is possible to decrypt encrypted information such as database authentication information. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.htmlBy an attacker with access to the product, BOSS The authentication information of the database may be obtained. Toshiba CHEC is a product of Toshiba Corporation.
Successful exploits will allow attackers to obtain sensitive information that may aid in further attacks
| VAR-201506-0170 | CVE-2015-0737 | Cisco FireSIGHT system Software cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in Cisco FireSIGHT System Software 5.3.1.1 allow remote attackers to inject arbitrary web script or HTML via a crafted (1) GET or (2) POST parameter, aka Bug ID CSCuu11099. Cisco FireSIGHT system The software contains a cross-site scripting vulnerability.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCuu11099. Cisco FireSIGHT System Software is a set of management center software of Cisco (Cisco), which supports centralized management of the network security and operation functions of Cisco ASA and Cisco FirePOWER network security devices using FirePOWER Services