VARIoT IoT vulnerabilities database
| VAR-201411-0206 | CVE-2014-8727 |
F5 BIG-IP Vulnerable to directory traversal
Related entries in the VARIoT exploits database: VAR-E-201411-0127 |
CVSS V2: 6.2 CVSS V3: - Severity: MEDIUM |
Multiple directory traversal vulnerabilities in F5 BIG-IP before 10.2.2 allow local users with the "Resource Administrator" or "Administrator" role to enumerate and delete arbitrary files via a .. (dot dot) in the name parameter to (1) tmui/Control/jspmap/tmui/system/archive/properties.jsp or (2) tmui/Control/form. ( Dot dot ) including (1) tmui/Control/jspmap/tmui/system/archive/properties.jsp Or (2) tmui/Control/form of name Arbitrary files may be enumerated and deleted via parameters. F5 Networks BIG-IP is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. F5 BIG-IP is an all-in-one network device integrated with network traffic management, application security management, load balancing and other functions from F5 Corporation of the United States. There is a directory traversal vulnerability in F5 BIG-IP 10.2.1 and earlier versions. The vulnerability is caused by the tmui/Control/jspmap/tmui/system/archive/properties.jsp script and tmui/Control/form URL not adequately filtering the 'name' parameter
| VAR-201411-0420 | CVE-2014-5424 | Rockwell Automation Connected Components Workbench Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Rockwell Automation Connected Components Workbench (CCW) before 7.00.00 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an invalid property value to an ActiveX control that was built with an outdated compiler. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the RA.ViewElements.Grid.1 ActiveXControl method. By providing a malicious value to the LeftXOffset property, an attacker can write a four byte null value to an arbitrary location. An attacker could use this to execute arbitrary code in the context of the browser. Rockwell Automation CCW is an HMI editor and component-level industrial product for designing and configuring applications and implementing microcontrollers. Failed exploit attempts will likely result in denial-of-service conditions.
Rockwell Automation CCW 6.01.00 and prior are vulnerable. The software can be used for controller programming and device configuration, and is integrated with an HMI editor to further simplify stand-alone device programming. A security vulnerability exists in Rockwell Automation CCW versions prior to 7.00.00 due to the program using an older version of the compiler to create custom ActiveX components
| VAR-201411-0560 | No CVE | Apple iPhone Sandbox Security Bypass Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Apple iPhone is a popular smartphone device. The Apple iPhone has a sandbox security bypass vulnerability that an attacker can use to bypass the sandbox restrictions. This may aid in further attacks.
Very limited information is currently available regarding this issue. We will update this BID as more information emerges
| VAR-201412-0399 | CVE-2014-9173 | WordPress for Google Doc Embedder Plug-in view.php In SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
SQL injection vulnerability in view.php in the Google Doc Embedder plugin before 2.5.15 for WordPress allows remote attackers to execute arbitrary SQL commands via the gpid parameter.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Google Doc Embedder Plugin 2.5.14 is vulnerable; other versions may also be affected. WordPress is a set of blogging platform developed by WordPress Software Foundation using PHP language, which supports setting up personal blogging websites on PHP and MySQL servers. Google Doc Embedder is one of the plugins that can embed MS Office, PDF and other file systems into web pages
| VAR-201411-0561 | No CVE | Vulnerability in JP1/NETM/DM and Job Management Partner 1/Software Distribution data reproduction functionality |
CVSS V2: 4.6 CVSS V3: - Severity: Medium |
JP1/NETM/DM and Job Management Partner 1/Software Distribution contain a vulnerability that prevents them from disabling writing to built-in USB storage devices.An attacker can exploit this vulnerability to prevent the affected products from disabling writing to built-in type USB storage devices.
| VAR-201411-0154 | CVE-2014-6324 | Microsoft Windows Kerberos Key Distribution Center (KDC) fails to properly validate Privilege Attribute Certificate (PAC) signature |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability.". Microsoft Windows of Kerberos Key Distribution Center (KDC) Is Privilege Attribute Certificate (PAC) There is a vulnerability that fails to verify signatures. Microsoft Windows of Kerberos Key Distribution Center (KDC) Is Kerberos Included in ticket request Privilege Attribute Certificate (PAC) I have an issue where my signature is not properly verified (CWE-347) . PAC By crafting the information contained in, users with domain credentials may gain higher privileges. CWE-347: Improper Verification of Cryptographic Signature https://cwe.mitre.org/data/definitions/347.html According to the developer, we are confirming attack activity using this vulnerability. For more information on vulnerabilities, Microsoft Security Research and Defense Blog It is described in. Microsoft Security Research and Defense Blog: Additional information about CVE-2014-6324 http://blogs.technet.com/b/srd/archive/2014/11/18/additional-information-about-cve-2014-6324.aspxUsers with domain credentials can gain domain administrator privileges and take over all computers in the domain, including domain controllers. Microsoft Windows is prone to a remote privilege-escalation vulnerability.
An attacker can exploit this issue to gain elevated privileges within the context of the application; this can result in the attacker gaining complete control of the affected system. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04526330
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04526330
Version: 1
HPSBMU03224 rev.1 - HP LoadRunner and Performance Center, Load Generator
Virtual Machine Images, running Windows, Remote Elevation of Privilege
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2015-01-23
Last Updated: 2015-01-23
Potential Security Impact: Remote elevation of privilege
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP LoadRunner and
Performance Center, Load Generator Virtual Machine Images, running Windows .
The vulnerability in Windows running in virtual machine images provided with
LoadRunner and Load Generator could be exploited remotely to allow elevation
of privilege.
References:
CVE-2014-6324
MS14-068
SSRT101864
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Verison v12.01 of HP LoadRunner and Performance Center, Load Generator
Virtual Machine Images, running Windows
Note: This vulnerability applies to HP LoadRunner and Performance Center,
Load Generator Virtual Machine Images, running Windows for version v12.01
only, and only for load generators that are currently deployed in the cloud
using the Windows OS.
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-6324 (AV:N/AC:L/Au:S/C:C/I:C/A:C) 9.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following instructions to resolve the vulnerability in HP
LoadRunner and Performance Center, Load Generator Virtual Machine Images,
running Windows
https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea
rch/document/KM01291238
Note: The issue is also resolved in HP LoadRunner and Performance Center,
Load Generator Virtual Machine Images provided in v12.02 and subsequent
versions.
HISTORY
Version:1 (rev.1) - 23 January 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlTCmtgACgkQ4B86/C0qfVmhxQCfWp4PL5wmXJOmTSBmACVXyLP6
7LUAnjXzF6Ir9P/Yreuv1PPOGdi2lKW6
=Lbqp
-----END PGP SIGNATURE-----
| VAR-201411-0393 | CVE-2014-8442 | Adobe Flash Player and Adobe AIR Vulnerabilities whose integrity level is low to medium |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to complete a transition from Low Integrity to Medium Integrity by leveraging incorrect permissions.
Remote attackers can exploit this issue to execute arbitrary code with elevated privileges. Security flaws exist in several Adobe products. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201411-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Adobe Flash Player: Multiple vulnerabilities
Date: November 21, 2014
Bugs: #525430, #529088
ID: 201411-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-plugins/adobe-flash < 11.2.202.418 >= 11.2.202.418
Description
===========
Multiple vulnerabilities have been discovered in Adobe Flash Player.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0392 | CVE-2014-8441 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-0581, and CVE-2014-8440. This vulnerability CVE-2014-0576 , CVE-2014-0581 ,and CVE-2014-8440 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0391 | CVE-2014-8440 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-0581, and CVE-2014-8441. This vulnerability CVE-2014-0576 , CVE-2014-0581 ,and CVE-2014-8441 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0389 | CVE-2014-8438 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0573 and CVE-2014-0588. This vulnerability CVE-2014-0573 and CVE-2014-0588 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
(CVE-2014-8437)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.418.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0388 | CVE-2014-8437 | Adobe Flash Player and Adobe AIR Vulnerable to acquiring session tokens |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow remote attackers to discover session tokens via unspecified vectors.
Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0261 | CVE-2014-0577 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, and CVE-2014-0590. This vulnerability CVE-2014-0584 , CVE-2014-0585 , CVE-2014-0586 ,and CVE-2014-0590 Is a different vulnerability.Unspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0259 | CVE-2014-0574 | Adobe Flash Player and Adobe AIR Memory double free vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Double free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. A double free vulnerability exists in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
(CVE-2014-8437)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.418.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0260 | CVE-2014-0576 | Adobe Flash Player and Adobe AIR Vulnerabilities in arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0581, CVE-2014-8440, and CVE-2014-8441. This vulnerability is CVE-2014-0581 , CVE-2014-8440 ,and CVE-2014-8441 This is a different vulnerability.Arbitrary code execution or denial of service by an attacker ( Memory corruption ) May be in a state.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0258 | CVE-2014-0573 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0588 and CVE-2014-8438. This vulnerability CVE-2014-0588 and CVE-2014-8438 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
(CVE-2014-8437)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.418.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0041 | CVE-2014-0590 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, and CVE-2014-0586. This vulnerability CVE-2014-0577 , CVE-2014-0584 , CVE-2014-0585 ,and CVE-2014-0586 Is a different vulnerability.Unspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0040 | CVE-2014-0589 | Adobe Flash Player and Adobe AIR Heap-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0582. This vulnerability CVE-2014-0582 Is a different vulnerability.An attacker could execute arbitrary code. Failed exploit attempts likely result in denial-of-service conditions. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0038 | CVE-2014-0586 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, and CVE-2014-0590. This vulnerability CVE-2014-0577 , CVE-2014-0584 , CVE-2014-0585 ,and CVE-2014-0590 Is a different vulnerability.Unspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0039 | CVE-2014-0588 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0573 and CVE-2014-8438. This vulnerability CVE-2014-0573 and CVE-2014-8438 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely cause a denial-of-service condition. A use-after-free vulnerability exists in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
(CVE-2014-8437)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.418.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0035 | CVE-2014-0583 | Adobe Flash Player and Adobe AIR Heap-based buffer overflow vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to complete a transition from Low Integrity to Medium Integrity via unspecified vectors.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts likely result in denial-of-service conditions. An attacker could exploit this vulnerability to take control of an affected system and convert Low Integrity to Medium Integrity. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201411-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Adobe Flash Player: Multiple vulnerabilities
Date: November 21, 2014
Bugs: #525430, #529088
ID: 201411-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-plugins/adobe-flash < 11.2.202.418 >= 11.2.202.418
Description
===========
Multiple vulnerabilities have been discovered in Adobe Flash Player.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5