US-CERT Technical Cyber Security Alert TA11-222A -- Adobe Updates for Multiple Vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                    National Cyber Alert System

              Technical Cyber Security Alert TA11-222A


Adobe Updates for Multiple Vulnerabilities

   Original release date: August 10, 2011
   Last revised: --
   Source: US-CERT


Systems Affected

     * Shockwave Player 11.6.0.626 and earlier versions for Windows and Macintosh
     * Flash Media Server 4.0.2 and earlier versions for Windows and Linux
     * Flash Media Server 3.5.6 and earlier versions for Windows and Linux
     * Adobe Flash Player 10.3.181.36 and earlier versions for Windows, Macintosh, Linux, and Solaris operating systems
     * Adobe Flash Player 10.3.185.25 and earlier versions for Android
     * Adobe AIR 2.7 and earlier versions for Windows, Macintosh, and Android
     * Adobe Photoshop CS5 and CS5.1 and earlier versions for Windows and Macintosh
     * RoboHelp 9 (versions 9.0.1.232 and earlier), RoboHelp 8, RoboHelp Server 9, and RoboHelp Server 8 for Windows


Overview

   There are multiple vulnerabilities in Adobe Shockwave Player, Flash
   Media Server, Flash Player, Photoshop CS5, and RoboHelp. Adobe has
   released updates to address these vulnerabilities.


I. Description

   Adobe security bulletins APSB11-19, APSB11-20, APSB11-21,
   APSB11-22, and APSB11-23 describe multiple vulnerabilities in Adobe
   Shockwave Player, Flash Media Server, Flash Player, Photoshop CS5,
   and RoboHelp. An attacker may use these vulnerabilities to run
   malicious code or cause a denial of service on an affected system.
   Adobe has released updates to address these vulnerabilities.


II. Impact

   These vulnerabilities could allow an attacker to run malicious code
   on the affected system or cause a denial of service.


III. Solution

   Users of these Adobe products should review the relevant Adobe
   security bulletins and follow the recommendations in the "Solution"
   section.

   APSB11-19: Security update available for Adobe Shockwave Player

   APSB11-20: Security update available for Adobe Flash Media Server

   APSB11-21: Security update available for Adobe Flash Player

   APSB11-22: Security update available for Adobe Photoshop CS5

   APSB11-23: Security updates available for RoboHelp


IV. References

 * Security update available for Adobe Shockwave Player -
   <http://www.adobe.com/support/security/bulletins/apsb11-19.html>

 * Security update available for Adobe Flash Media Server -
   <http://www.adobe.com/support/security/bulletins/apsb11-20.html>

 * Security update available for Adobe Flash Player -
   <http://www.adobe.com/support/security/bulletins/apsb11-21.html>

 * Security update available for Adobe Photoshop CS5 -
   <http://www.adobe.com/support/security/bulletins/apsb11-22.html>

 * Security updates available for RoboHelp -
   <http://www.adobe.com/support/security/bulletins/apsb11-23.html>

 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA11-222A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@xxxxxxxx> with "TA11-222A Feedback VU#628023" in
   the subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2011 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________

Revision History

  August 10, 2011: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTkKXaz6pPKYJORa3AQL/lQgAgO8eDjAJt7tFpd9jW8YY0yf92QY84f2r
TQcMgYyxhyyuA0joIWQ7k6BkszfNns03tr6k9ay2r2e3dICUhtgugh20yeoyV6ua
gwII/qNhPoVPlt3z3yJR4BQzhlyAYMlG4CKJWxX84Hkpq9FeQYDRO6Ni8WF2wiUC
eeT7feK10Q+3w0UZinW11Cz6GISqQeb8E0YVX7lNH8svA/Du9UdOFnRgbWeBRtM9
4Fj+eRVdYqxpxy7z85EPIGwrKIop/D/HXaaNpXbkru1iXkLvAbBi2hpd4aeaQHva
wpaAuNYwv5WxbdmcarXuJqs3a0v9+Mwd39bf8OxqUXLUX8h4LyGWJA==
=QDsc
-----END PGP SIGNATURE-----


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux