-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Foresight Linux Essential Advisory: 2007-0032-1 Published: 2007-07-20 Rating: Major Updated Versions: flashplayer=/zaphod.rpath.org@zap:1/9.0.48.0-2-1 group-dist=/foresight.rpath.org@fl:1-devel//1/1.3.2-0.5-2 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456 Description: Previous versions of the flashplayer package are vulnerable to a buffer overflow attack caused by an input validation error. An attacker may use malformed or malicious SWF or FLV files to execute arbitrary code as the user of the flashplayer application. Because most flash content is provided by web-pages, this is effectively a remote vulnerability, but can be mitigated if the user disables flash in the browser. - --- Copyright 2007 Foresight Linux Project This file is distributed under the terms of the MIT License. A copy is available at http://www.foresightlinux.org/permanent/mit-license.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.4 (GNU/Linux) iQIVAwUBRqERutfwEn07iAtZAQK5WQ/+KSqalewj1At/YxQ8gTKsyNniLoNN0y2b TuXu11U/shpwaLSluxm5lz+dOZKX3lAjcyrQhNHijj+IilIr9ZaIvM/ai59/KZJi 2+Ap/kpsjxSsJ09zrNpJjr0rKdMKEhlfmQXXK7rDkirgJO353uE32VPszhZPqOjB wSOIE6NF+E/W/r+aOvFM/IN1FQGiuhtlj2S2ewiOS9qDgkAytMgOmIHGpp+580GJ 8YEGsig6g5ouINW3yoH6Ld49dQzkSPzPQPkts934lQtoZjmFM5UQ9QPDXMSsHx3w 3HOH+xLzITEdppPoTIFLel0krCdJaKV7e2AEs5UOJr+GLjkDeGC7gEY/sM8sRnAI Fm6Pt2iWmOKnNTcdZArjGRm9iYh5IwkUqJS7vZeEEpW5int/fmbC+qxJO9g3R07d UPWUj2+AZ4J9TDoYw0TfE5j/vlPQsqcGgon0VJEOXU3M6T04PEVr4EQc0mbL9ZHk B+Z6cnMhfKFvtZ9hPMzM6uW7qxRnoDY3RKNw4wzFFDhLLIny538JVHyDMyJ1O4iB P14IBDbRLEbemsVlSTM3UCGQFdgO12iuDLVR8HogzOqBgPJzfmthklpeu4VMVrtv Q5IpDNb2oUp7mUW1CfVF8xOdV/XZ6nWqhRac5eecWRCtHUqQZp1W3UEkhAgrurrj dO6uUKwdvtg= =d29Z -----END PGP SIGNATURE-----