VARIoT IoT vulnerabilities database
    | VAR-201202-0223 | CVE-2012-0243 | Advantech/BroadWin WebAccess of ActiveX Control buffer overflow vulnerability | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Buffer overflow in an ActiveX control in bwocxrun.ocx in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code by leveraging the ability to write arbitrary content to any pathname. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0219 | CVE-2012-0239 | Advantech/BroadWin WebAccess of uaddUpAdmin.asp Vulnerabilities in changing administrator passwords | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            uaddUpAdmin.asp in Advantech/BroadWin WebAccess before 7.0 does not properly perform authentication, which allows remote attackers to modify an administrative password via a password-change request. Advantech/BroadWin WebAccess of uaddUpAdmin.asp Contains a vulnerability where the administrator password can be changed due to improper authentication.A third party may change the administrator password via a password change request. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0038 | CVE-2011-4524 | Advantech/BroadWin WebAccess Vulnerable to buffer overflow | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Buffer overflow in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via a long string value in unspecified parameters. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0215 | CVE-2012-0235 | Advantech/BroadWin WebAccess Vulnerable to cross-site request forgery | 
                                      
                                        CVSS V2: 6.0 CVSS V3: - Severity: MEDIUM  | 
                            Cross-site request forgery (CSRF) vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. Advantech/BroadWin WebAccess Contains a cross-site request forgery vulnerability.Authentication may be hijacked by a third party. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0218 | CVE-2012-0238 | Advantech/BroadWin WebAccess of opcImg.asp Vulnerable to stack-based buffer overflow | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Stack-based buffer overflow in opcImg.asp in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via unspecified vectors. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0224 | CVE-2012-0244 | Advantech/BroadWin WebAccess In SQL Injection vulnerability | 
                                      
                                        CVSS V2: 7.5 CVSS V3: - Severity: HIGH  | 
                            Multiple SQL injection vulnerabilities in Advantech/BroadWin WebAccess before 7.0 allow remote attackers to execute arbitrary SQL commands via crafted string input. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0213 | CVE-2012-0233 | Advantech/BroadWin WebAccess Vulnerable to cross-site scripting | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            Cross-site scripting (XSS) vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to inject arbitrary web script or HTML via a malformed URL. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0214 | CVE-2012-0234 | Advantech/BroadWin WebAccess In SQL Injection vulnerability | 
                                      
                                        CVSS V2: 7.5 CVSS V3: - Severity: HIGH  | 
                            SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary SQL commands via a malformed URL. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0036 | CVE-2011-4522 | Advantech/BroadWin WebAccess of bwview.asp Vulnerable to cross-site scripting | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            Cross-site scripting (XSS) vulnerability in bwerrdn.asp in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess bwerrdn.asp lacks filtering on parameters leading to cross-site scripting attacks. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0039 | CVE-2011-4525 | Advantech/BroadWin WebAccess Vulnerable to arbitrary code execution | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Advantech/BroadWin WebAccess before 7.0 allows remote attackers to trigger the extraction of arbitrary web content into a batch file on a client system, and execute this batch file, via unspecified vectors. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. A security vulnerability exists in Advantech WebAccess. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0217 | CVE-2012-0237 | Advantech/BroadWin WebAccess Vulnerabilities that change the date and time synchronization settings | 
                                      
                                        CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM  | 
                            Advantech/BroadWin WebAccess before 7.0 allows remote attackers to (1) enable date and time syncing or (2) disable date and time syncing via a crafted URL. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0037 | CVE-2011-4523 | Advantech/BroadWin WebAccess of bwview.asp Vulnerable to cross-site scripting | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            Cross-site scripting (XSS) vulnerability in bwview.asp in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess bwview.asp lacks filtering on parameters leading to cross-site scripting attacks. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0216 | CVE-2012-0236 | Advantech/BroadWin WebAccess Vulnerability in which important information is obtained | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            Advantech/BroadWin WebAccess 7.0 and earlier allows remote attackers to obtain sensitive information via a direct request to a URL.  NOTE: the vendor reportedly "does not consider it to be a security risk.". Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess submits a specially crafted URL that does not authenticate users with access to restricted information. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. Vulnerabilities exist in Advantech/BroadWin WebAccess 7.0 and earlier versions. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0222 | CVE-2012-0242 | Advantech/BroadWin WebAccess Format string vulnerability | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Format string vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via format string specifiers in a message string. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0221 | CVE-2012-0241 | Advantech/BroadWin WebAccess Service disruption in ( Memory corruption ) Vulnerabilities | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            Advantech/BroadWin WebAccess before 7.0 allows remote attackers to cause a denial of service (memory corruption) via a modified stream identifier to a function. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0040 | CVE-2011-4526 | Advantech/BroadWin WebAccess of ActiveX Control buffer overflow vulnerability | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Buffer overflow in an ActiveX control in Advantech/BroadWin WebAccess before 7.0 might allow remote attackers to execute arbitrary code via a long string value in unspecified parameters. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201202-0035 | CVE-2011-4521 | Advantech/BroadWin WebAccess In SQL Injection vulnerability | 
                                      
                                        CVSS V2: 7.5 CVSS V3: - Severity: HIGH  | 
                            SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary SQL commands via crafted string input. Advantech Advantech specializes in network computer and network automation, providing more than 450 products including industrial data acquisition, automation software, computer platforms, Advantech industrial computers, computer motherboards and accessories. Advantech/BroadWin SCADA WebAccess is a fully browser-based Human Machine Interface (HMI) and Monitoring and Data Acquisition (SCADA) software. Advantech WebAccess is prone to multiple remote vulnerabilities. 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or  exploit latent vulnerabilities in the underlying database, execute arbitrary code gain access to sensitive information, cause a denial-of-service condition.  Other attacks are possible. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool. 
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/ 
----------------------------------------------------------------------
TITLE:
Advantech OPC Server ADAM ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA46775
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46775/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
RELEASE DATE:
2011-11-07
DISCUSS ADVISORY:
http://secunia.com/advisories/46775/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46775/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46775
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Advantech OPC Server, which can
be exploited by malicious people to compromise a user's system. 
The vulnerability is caused due to an error in the ADAM ActiveX
control and can be exploited to cause a buffer overflow. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in the following components:
* Advantech ADAM OPC Server versions prior to V3.01.012. 
* Advantech Modbus RTU OPC Server versions prior to V3.01.010. 
* Advantech Modbus TCP OPC Server versions prior to V3.01.010. 
SOLUTION:
Reportedly a patch has been released. Contact the vendor for further
information. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Security Research and Service Institute Information
and Communication Security Technology Center (ICST). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201111-0262 | CVE-2011-2458 | Adobe Flash Player and Adobe AIR Vulnerable to bypass cross-domain policy | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, when Internet Explorer is used, allows remote attackers to bypass the cross-domain policy via a crafted web site. 
An attacker can exploit this issue to bypass certain same-origin policy restrictions, which may aid in further attacks. The product enables viewing of applications, content and video across screens and browsers. 
For more information:
SA46818
2) A double free error exists in the Theora decoder. 
3) Some errors in the MKV and Vorbis media handlers can be exploited
to perform an out of bounds read. 
7) A use-after-free error exists within certain editing
functionality. 
8) The application fails to ask for permission when running some JRE7
applets. 
SOLUTION:
Update to version 15.0.874.120. 
PROVIDED AND/OR DISCOVERED BY:
8) Chris Evans, Google Chrome Security Team. 
The vendor also credits:
2, 3, 5) Aki Helin, OUSPG. 
4) Andrew Scherkus, Chromium development community. 
6) Ken \x93strcpy\x94 Russell, Chromium development community. 
7) pa_kt via ZDI. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201204-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Severity: Normal
    Title: Adobe Flash Player: Multiple vulnerabilities
     Date: April 17, 2012
     Bugs: #390149, #404101, #407023, #410005
       ID: 201204-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities in Adobe Flash Player, the worst of which
might allow remote attackers to execute arbitrary code. 
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites. 
Please review the CVE identifiers referenced below for details. 
Impact
======
A remote attacker could entice a user to open a specially crafted SWF
file, possibly resulting in execution of arbitrary code with the
privileges of the process or a Denial of Service condition. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.228"
References
==========
[  1 ] CVE-2011-2445
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2445
[  2 ] CVE-2011-2450
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2450
[  3 ] CVE-2011-2451
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2451
[  4 ] CVE-2011-2452
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2452
[  5 ] CVE-2011-2453
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2453
[  6 ] CVE-2011-2454
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2454
[  7 ] CVE-2011-2455
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2455
[  8 ] CVE-2011-2456
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2456
[  9 ] CVE-2011-2457
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2457
[ 10 ] CVE-2011-2458
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2458
[ 11 ] CVE-2011-2459
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2459
[ 12 ] CVE-2011-2460
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2460
[ 13 ] CVE-2012-0752
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0752
[ 14 ] CVE-2012-0753
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0753
[ 15 ] CVE-2012-0754
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0754
[ 16 ] CVE-2012-0755
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0755
[ 17 ] CVE-2012-0756
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0756
[ 18 ] CVE-2012-0767
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0767
[ 19 ] CVE-2012-0768
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0768
[ 20 ] CVE-2012-0769
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0769
[ 21 ] CVE-2012-0773
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0773
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201204-07.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. ----------------------------------------------------------------------
SC World Congress, New York, USA, 16 November 2011
Visit the Secunia booth (#203) and discover how you can improve your handling of third party programs:
http://secunia.com/resources/events/sc_2011/ 
----------------------------------------------------------------------
TITLE:
Adobe Flash Player Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA46818
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46818/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46818
RELEASE DATE:
2011-11-11
DISCUSS ADVISORY:
http://secunia.com/advisories/46818/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46818/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46818
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Adobe Flash Player,
which can be exploited by malicious people to bypass certain security
restrictions and compromise a user's system. 
1) An unspecified error can be exploited to corrupt memory. 
2) An unspecified error can be exploited to cause a heap-based buffer
overflow. 
3) An unspecified error can be exploited to corrupt memory. 
4) An unspecified error can be exploited to corrupt memory. 
5) An unspecified error can be exploited to corrupt memory. 
6) An unspecified error can be exploited to corrupt memory. 
7) An unspecified error can be exploited to corrupt memory. 
8) An unspecified error can be exploited to cause a buffer overflow. 
9) An unspecified error can be exploited to cause a stack-based
buffer overflow. 
10) An unspecified error can be exploited to bypass the cross-domain
policy. 
Note: This vulnerability affects users running Internet Explorer
only. 
11) An unspecified error can be exploited to corrupt memory. 
12) An unspecified error can be exploited to corrupt memory. 
Successful exploitation of vulnerabilities #1 through #9, #11, and
#12 may allow execution of arbitrary code. 
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ivan Golenkov and Alexander Gostev, Kaspersky Lab
2-6, 9, 12) Tavis Ormandy, Google Security Team 
7) Bo Qu, Palo Alto Networks
8) Ben Hawkes, Google Security Team
10) lakehu, Tencent Security Center
11) anonymous via iDefense Labs
ORIGINAL ADVISORY:
http://www.adobe.com/support/security/bulletins/apsb11-28.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. This fixes multiple
vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting attacks, gain knowledge of potentially
sensitive information, bypass certain security restrictions, and
compromise a user's system
                        
| VAR-201111-0259 | CVE-2011-2455 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2459, and CVE-2011-2460. Failed exploit attempts will likely result in denial-of-service conditions. The product enables viewing of applications, content and video across screens and browsers. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Critical: flash-plugin security update
Advisory ID:       RHSA-2011:1445-01
Product:           Red Hat Enterprise Linux Extras
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1445.html
Issue date:        2011-11-11
CVE Names:         CVE-2011-2445 CVE-2011-2450 CVE-2011-2451 
                   CVE-2011-2452 CVE-2011-2453 CVE-2011-2454 
                   CVE-2011-2455 CVE-2011-2456 CVE-2011-2457 
                   CVE-2011-2459 CVE-2011-2460 
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. 
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section. 
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed on the Adobe security page APSB11-28, listed
in the References section. 
Multiple security flaws were found in the way flash-plugin displayed
certain SWF content. An attacker could use these flaws to create a
specially-crafted SWF file that would cause flash-plugin to crash or,
potentially, execute arbitrary code when the victim loaded a page
containing the specially-crafted SWF content. 
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
752983 - flash-plugin: mulitple code execution flaws (APSB11-28)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-10.3.183.11-1.el5.i386.rpm
x86_64:
flash-plugin-10.3.183.11-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-10.3.183.11-1.el5.i386.rpm
x86_64:
flash-plugin-10.3.183.11-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-10.3.183.11-1.el6.i686.rpm
x86_64:
flash-plugin-10.3.183.11-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-10.3.183.11-1.el6.i686.rpm
x86_64:
flash-plugin-10.3.183.11-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-10.3.183.11-1.el6.i686.rpm
x86_64:
flash-plugin-10.3.183.11-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-2445.html
https://www.redhat.com/security/data/cve/CVE-2011-2450.html
https://www.redhat.com/security/data/cve/CVE-2011-2451.html
https://www.redhat.com/security/data/cve/CVE-2011-2452.html
https://www.redhat.com/security/data/cve/CVE-2011-2453.html
https://www.redhat.com/security/data/cve/CVE-2011-2454.html
https://www.redhat.com/security/data/cve/CVE-2011-2455.html
https://www.redhat.com/security/data/cve/CVE-2011-2456.html
https://www.redhat.com/security/data/cve/CVE-2011-2457.html
https://www.redhat.com/security/data/cve/CVE-2011-2459.html
https://www.redhat.com/security/data/cve/CVE-2011-2460.html
https://access.redhat.com/security/updates/classification/#critical
http://www.adobe.com/support/security/bulletins/apsb11-28.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFOvQ7YXlSAg2UNWIIRAnjKAJ9IBGUxIPb3wKrfMJ+365x1fi4VCgCfRQ3T
zthsykex3oM7jAzeyW7KUa0=
=VH9O
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. 
For more information:
SA46818
2) A double free error exists in the Theora decoder. 
3) Some errors in the MKV and Vorbis media handlers can be exploited
to perform an out of bounds read. 
7) A use-after-free error exists within certain editing
functionality. 
8) The application fails to ask for permission when running some JRE7
applets. 
SOLUTION:
Update to version 15.0.874.120. 
PROVIDED AND/OR DISCOVERED BY:
8) Chris Evans, Google Chrome Security Team. 
The vendor also credits:
2, 3, 5) Aki Helin, OUSPG. 
4) Andrew Scherkus, Chromium development community. 
6) Ken \x93strcpy\x94 Russell, Chromium development community. 
7) pa_kt via ZDI. 
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites. 
Please review the CVE identifiers referenced below for details. 
Furthermore, a remote attacker may be able to bypass intended access
restrictions, bypass cross-domain policy, inject arbitrary web script,
or obtain sensitive information. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.228"
References
==========
[  1 ] CVE-2011-2445
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2445
[  2 ] CVE-2011-2450
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2450
[  3 ] CVE-2011-2451
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2451
[  4 ] CVE-2011-2452
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2452
[  5 ] CVE-2011-2453
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2453
[  6 ] CVE-2011-2454
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2454
[  7 ] CVE-2011-2455
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2455
[  8 ] CVE-2011-2456
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2456
[  9 ] CVE-2011-2457
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2457
[ 10 ] CVE-2011-2458
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2458
[ 11 ] CVE-2011-2459
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2459
[ 12 ] CVE-2011-2460
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2460
[ 13 ] CVE-2012-0752
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0752
[ 14 ] CVE-2012-0753
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0753
[ 15 ] CVE-2012-0754
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0754
[ 16 ] CVE-2012-0755
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0755
[ 17 ] CVE-2012-0756
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0756
[ 18 ] CVE-2012-0767
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0767
[ 19 ] CVE-2012-0768
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0768
[ 20 ] CVE-2012-0769
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0769
[ 21 ] CVE-2012-0773
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0773
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201204-07.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. ----------------------------------------------------------------------
SC World Congress, New York, USA, 16 November 2011
Visit the Secunia booth (#203) and discover how you can improve your handling of third party programs:
http://secunia.com/resources/events/sc_2011/ 
----------------------------------------------------------------------
TITLE:
Adobe Flash Player Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA46818
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46818/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46818
RELEASE DATE:
2011-11-11
DISCUSS ADVISORY:
http://secunia.com/advisories/46818/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46818/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46818
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Adobe Flash Player,
which can be exploited by malicious people to bypass certain security
restrictions and compromise a user's system. 
1) An unspecified error can be exploited to corrupt memory. 
2) An unspecified error can be exploited to cause a heap-based buffer
overflow. 
3) An unspecified error can be exploited to corrupt memory. 
4) An unspecified error can be exploited to corrupt memory. 
5) An unspecified error can be exploited to corrupt memory. 
6) An unspecified error can be exploited to corrupt memory. 
7) An unspecified error can be exploited to corrupt memory. 
8) An unspecified error can be exploited to cause a buffer overflow. 
9) An unspecified error can be exploited to cause a stack-based
buffer overflow. 
10) An unspecified error can be exploited to bypass the cross-domain
policy. 
Note: This vulnerability affects users running Internet Explorer
only. 
11) An unspecified error can be exploited to corrupt memory. 
12) An unspecified error can be exploited to corrupt memory. 
Successful exploitation of vulnerabilities #1 through #9, #11, and
#12 may allow execution of arbitrary code. 
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ivan Golenkov and Alexander Gostev, Kaspersky Lab
2-6, 9, 12) Tavis Ormandy, Google Security Team 
7) Bo Qu, Palo Alto Networks
8) Ben Hawkes, Google Security Team
10) lakehu, Tencent Security Center
11) anonymous via iDefense Labs
ORIGINAL ADVISORY:
http://www.adobe.com/support/security/bulletins/apsb11-28.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. This fixes multiple
vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting attacks, gain knowledge of potentially
sensitive information, bypass certain security restrictions, and
compromise a user's system
                        
| VAR-201111-0264 | CVE-2011-2460 | Adobe Flash Player and Adobe AIR Service disruption in (DoS) Vulnerabilities | 
                                      
                                        CVSS V2: 10.0 CVSS V3: - Severity: HIGH  | 
                            Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, and CVE-2011-2459. Failed exploit attempts will likely result in denial-of-service conditions. The product enables viewing of applications, content and video across screens and browsers. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Critical: flash-plugin security update
Advisory ID:       RHSA-2011:1445-01
Product:           Red Hat Enterprise Linux Extras
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1445.html
Issue date:        2011-11-11
CVE Names:         CVE-2011-2445 CVE-2011-2450 CVE-2011-2451 
                   CVE-2011-2452 CVE-2011-2453 CVE-2011-2454 
                   CVE-2011-2455 CVE-2011-2456 CVE-2011-2457 
                   CVE-2011-2459 CVE-2011-2460 
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. 
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section. 
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed on the Adobe security page APSB11-28, listed
in the References section. 
Multiple security flaws were found in the way flash-plugin displayed
certain SWF content. An attacker could use these flaws to create a
specially-crafted SWF file that would cause flash-plugin to crash or,
potentially, execute arbitrary code when the victim loaded a page
containing the specially-crafted SWF content. 
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
752983 - flash-plugin: mulitple code execution flaws (APSB11-28)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-10.3.183.11-1.el5.i386.rpm
x86_64:
flash-plugin-10.3.183.11-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-10.3.183.11-1.el5.i386.rpm
x86_64:
flash-plugin-10.3.183.11-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-10.3.183.11-1.el6.i686.rpm
x86_64:
flash-plugin-10.3.183.11-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-10.3.183.11-1.el6.i686.rpm
x86_64:
flash-plugin-10.3.183.11-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-10.3.183.11-1.el6.i686.rpm
x86_64:
flash-plugin-10.3.183.11-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-2445.html
https://www.redhat.com/security/data/cve/CVE-2011-2450.html
https://www.redhat.com/security/data/cve/CVE-2011-2451.html
https://www.redhat.com/security/data/cve/CVE-2011-2452.html
https://www.redhat.com/security/data/cve/CVE-2011-2453.html
https://www.redhat.com/security/data/cve/CVE-2011-2454.html
https://www.redhat.com/security/data/cve/CVE-2011-2455.html
https://www.redhat.com/security/data/cve/CVE-2011-2456.html
https://www.redhat.com/security/data/cve/CVE-2011-2457.html
https://www.redhat.com/security/data/cve/CVE-2011-2459.html
https://www.redhat.com/security/data/cve/CVE-2011-2460.html
https://access.redhat.com/security/updates/classification/#critical
http://www.adobe.com/support/security/bulletins/apsb11-28.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFOvQ7YXlSAg2UNWIIRAnjKAJ9IBGUxIPb3wKrfMJ+365x1fi4VCgCfRQ3T
zthsykex3oM7jAzeyW7KUa0=
=VH9O
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. 
For more information:
SA46818
2) A double free error exists in the Theora decoder. 
3) Some errors in the MKV and Vorbis media handlers can be exploited
to perform an out of bounds read. 
7) A use-after-free error exists within certain editing
functionality. 
8) The application fails to ask for permission when running some JRE7
applets. 
SOLUTION:
Update to version 15.0.874.120. 
PROVIDED AND/OR DISCOVERED BY:
8) Chris Evans, Google Chrome Security Team. 
The vendor also credits:
2, 3, 5) Aki Helin, OUSPG. 
4) Andrew Scherkus, Chromium development community. 
6) Ken \x93strcpy\x94 Russell, Chromium development community. 
7) pa_kt via ZDI. 
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites. 
Please review the CVE identifiers referenced below for details. 
Furthermore, a remote attacker may be able to bypass intended access
restrictions, bypass cross-domain policy, inject arbitrary web script,
or obtain sensitive information. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.228"
References
==========
[  1 ] CVE-2011-2445
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2445
[  2 ] CVE-2011-2450
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2450
[  3 ] CVE-2011-2451
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2451
[  4 ] CVE-2011-2452
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2452
[  5 ] CVE-2011-2453
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2453
[  6 ] CVE-2011-2454
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2454
[  7 ] CVE-2011-2455
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2455
[  8 ] CVE-2011-2456
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2456
[  9 ] CVE-2011-2457
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2457
[ 10 ] CVE-2011-2458
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2458
[ 11 ] CVE-2011-2459
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2459
[ 12 ] CVE-2011-2460
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2460
[ 13 ] CVE-2012-0752
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0752
[ 14 ] CVE-2012-0753
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0753
[ 15 ] CVE-2012-0754
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0754
[ 16 ] CVE-2012-0755
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0755
[ 17 ] CVE-2012-0756
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0756
[ 18 ] CVE-2012-0767
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0767
[ 19 ] CVE-2012-0768
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0768
[ 20 ] CVE-2012-0769
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0769
[ 21 ] CVE-2012-0773
       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0773
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201204-07.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. ----------------------------------------------------------------------
SC World Congress, New York, USA, 16 November 2011
Visit the Secunia booth (#203) and discover how you can improve your handling of third party programs:
http://secunia.com/resources/events/sc_2011/ 
----------------------------------------------------------------------
TITLE:
Adobe Flash Player Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA46818
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46818/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46818
RELEASE DATE:
2011-11-11
DISCUSS ADVISORY:
http://secunia.com/advisories/46818/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/46818/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46818
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Adobe Flash Player,
which can be exploited by malicious people to bypass certain security
restrictions and compromise a user's system. 
1) An unspecified error can be exploited to corrupt memory. 
2) An unspecified error can be exploited to cause a heap-based buffer
overflow. 
3) An unspecified error can be exploited to corrupt memory. 
4) An unspecified error can be exploited to corrupt memory. 
5) An unspecified error can be exploited to corrupt memory. 
6) An unspecified error can be exploited to corrupt memory. 
7) An unspecified error can be exploited to corrupt memory. 
8) An unspecified error can be exploited to cause a buffer overflow. 
9) An unspecified error can be exploited to cause a stack-based
buffer overflow. 
10) An unspecified error can be exploited to bypass the cross-domain
policy. 
Note: This vulnerability affects users running Internet Explorer
only. 
11) An unspecified error can be exploited to corrupt memory. 
12) An unspecified error can be exploited to corrupt memory. 
Successful exploitation of vulnerabilities #1 through #9, #11, and
#12 may allow execution of arbitrary code. 
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Ivan Golenkov and Alexander Gostev, Kaspersky Lab
2-6, 9, 12) Tavis Ormandy, Google Security Team 
7) Bo Qu, Palo Alto Networks
8) Ben Hawkes, Google Security Team
10) lakehu, Tencent Security Center
11) anonymous via iDefense Labs
ORIGINAL ADVISORY:
http://www.adobe.com/support/security/bulletins/apsb11-28.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. This fixes multiple
vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting attacks, gain knowledge of potentially
sensitive information, bypass certain security restrictions, and
compromise a user's system