US-CERT Technical Cyber Security Alert TA10-162A -- Adobe Flash and AIR Vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                    National Cyber Alert System

              Technical Cyber Security Alert TA10-162A


Adobe Flash and AIR Vulnerabilities

   Original release date: June 11, 2010
   Last revised: --
   Source: US-CERT


Systems Affected

     * Adobe Flash Player 10.0.45.2 and earlier 10.x versions
     * Adobe Flash Player 9.0.262 and earlier 9.x versions
     * Adobe AIR 1.5.3.9130 and earlier versions

     Other Adobe products that support Flash may also be vulnerable.


Overview

   According to Adobe Security Bulletin APSB10-14, there are
   vulnerabilities in Adobe Flash and AIR. These vulnerabilities
   affect Flash Player, AIR, and possibly other products that support
   Flash. A remote attacker could exploit these vulnerabilities to
   execute arbitrary code.


I. Description

   Adobe Security Bulletin APSB10-14 describes vulnerabilities in
   Adobe Flash that affects Flash Player and AIR. It may also affect
   other products that independently support Flash, such as Adobe
   Reader, Acrobat, Photoshop, Photoshop Lightroom, Freehand MX, and
   Fireworks.

   An attacker could exploit these vulnerabilities by convincing a
   user to open specially crafted Flash content. Flash content is
   commonly hosted on a web page, but it can also be embedded in a PDF
   and other documents or provided as a stand-alone file.

   One of these vulnerabilities, CVE-2010-1297, is being exploited
   against Flash Player, Adobe Reader, and Acrobat. Additional
   information about CVE-2010-1297 is available in US-CERT Technical
   Cyber Security Alert TA10-159A and US-CERT Vulnerability Note
   VU#486225.


II. Impact

   If a user opens specially crafted Flash content, a remote attacker
   may be able to execute arbitrary code.


III. Solution

 Update Flash and AIR

   Adobe Security Bulletin APSB10-14 recommends updating to Flash
   Player 10.1.53.64 or 9.0.277.0 and AIR to 2.0.2.12610. This will
   update the Flash web browser plug-in and ActiveX control and AIR,
   but will not update Flash support in Adobe Reader, Acrobat, or
   other products.

   To reduce your exposure to these and other Flash vulnerabilities,
   consider the following mitigation technique.

 Disable Flash in your web browser

   Uninstall Flash or restrict which sites are allowed to run Flash.
   To the extent possible, only run trusted Flash content on trusted
   domains. For more information, see Securing Your Web Browser.


IV. References

 * Adobe Security Bulletin APSB10-14 -
   <http://www.adobe.com/support/security/bulletins/apsb10-14.html>

 * Technical Cyber Security Alert TA10-159A -
   <http://www.us-cert.gov/cas/techalerts/TA10-159A.html>

 * US-CERT Vulnerability Report VU#486225 -
   <http://www.kb.cert.org/vuls/id/486225>

 * Securing Your Web Browser -
   <http://www.us-cert.gov/reading_room/securing_browser/>

 * CVE-2010-1297 -
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297>

 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA10-162A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@xxxxxxxx> with "TA10-162A Feedback VU#486225" in
   the subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2010 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________

Revision History

  June 11, 2010: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTBKnQj6pPKYJORa3AQIq+gf/emIaD07wO+6DwdTYMgpYQArprhO5bT+h
kgISYW+OW7Gt4Dq9BkoXgPzgahRRwQZnp0pgjzRst5PsC5+Vn4WCHR8OZBSEoSeo
eWL+Y8dqd/IYCPVWjocDbEoeKdDo02hIjRln3dIhvMYIJjO7hffL5OMhle1xW5aJ
y1dYQ4L5oT0OHWN4ZtLnvhMJoqEmpf2Pc2j92JrSNdnesgbGIYNgvcH43vHGQbPp
mA64SkfQCo80CeaSS6dPvnHfRhR8/lPWThoY6Mug4YcpO0Z9SZ7uQ1HftGdMkq67
E4kRZRpnpUGCglte3MVIg5gET3QV0Y8f2uDMv0fmEs38i91aRjJ0fA==
=v/JA
-----END PGP SIGNATURE-----


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux