SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Multimedia)  >   Adobe Flash Vendors:   Adobe Systems Incorporated
(Red Hat Issues Fix) Adobe Flash Player Memory Corruption Errors Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1023308
SecurityTracker URL:  http://securitytracker.com/id/1023308
CVE Reference:   CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800   (Links to External Site)
Date:  Dec 9 2009
Impact:   Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.0.32.18 and prior versions
Description:   Several vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information.

A remote user can create a specially crafted JPEG file that, when loaded by the target user, will execute arbitrary code on the target system [CVE-2009-3794]. The code will run with the privileges of the target user.

A remote user can create Flash content that, when loaded by the target user, will execute arbitrary code on the target system [CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, and CVE-2009-3800].

A remote user can access file names on target systems running Windows by exploiting the Flash Player ActiveX control [CVE-2009-3951].

Flash Professional CS3 and CS4 are also affected.

Jim Cheng of EffectiveUI, Bing Liu of Fortinet's FortiGuard Labs, an anonymous researcher via TippingPoint, Damian Put via TippingPoint, Will Dormann of CERT, and Manuel Caballero and Microsoft Vulnerability Research (MSVR) reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain potentially sensitive information.

Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2009-1657.html

Vendor URL:  www.adobe.com/support/security/bulletins/apsb09-19.html (Links to External Site)
Cause:   Access control error
Underlying OS:   Linux (Red Hat Enterprise)

Message History:   This archive entry is a follow-up to the message listed below.
Dec 9 2009 Adobe Flash Player Memory Corruption Errors Lets Remote Users Execute Arbitrary Code



 Source Message Contents

Date:  Wed, 9 Dec 2009 11:31:53 -0500
Subject:  [RHSA-2009:1657-01] Critical: flash-plugin security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Critical: flash-plugin security update
Advisory ID:       RHSA-2009:1657-01
Product:           Red Hat Enterprise Linux Extras
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2009-1657.html
Issue date:        2009-12-09
CVE Names:         CVE-2009-3794 CVE-2009-3796 CVE-2009-3797 
                   CVE-2009-3798 CVE-2009-3799 CVE-2009-3800 
=====================================================================

1. Summary:

An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 Supplementary.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

RHEL Desktop Supplementary (v. 5 client) - i386, x86_64
RHEL Supplementary (v. 5 server) - i386, x86_64

3. Description:

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.

Multiple security flaws were found in the way Flash Player displayed
certain SWF content. An attacker could use these flaws to create a
specially-crafted SWF file that would cause flash-plugin to crash or,
possibly, execute arbitrary code when the victim loaded a page containing
the specially-crafted SWF content. (CVE-2009-3794, CVE-2009-3796,
CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800)

All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 10.0.42.34.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network.  Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

543857 - flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800)

6. Package List:

RHEL Desktop Supplementary (v. 5 client):

i386:
flash-plugin-10.0.42.34-1.el5.i386.rpm

x86_64:
flash-plugin-10.0.42.34-1.el5.i386.rpm

RHEL Supplementary (v. 5 server):

i386:
flash-plugin-10.0.42.34-1.el5.i386.rpm

x86_64:
flash-plugin-10.0.42.34-1.el5.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800
http://www.redhat.com/security/updates/classification/#critical
http://www.adobe.com/support/security/bulletins/apsb09-19.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFLH9DpXlSAg2UNWIIRAsQkAKCFZm4pGqEI5SItuhVarIiwnjUevACgiwuC
TW3M79YeyspEscv8LFIugHE=
=6u/d
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC