Home / vulnerabilitiesPDF  

Technical Cyber Security Alert 2013-43A

Posted on 13 February 2013
Source : packetstormsecurity.org Link

 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System

US-CERT Alert TA13-043A
Adobe Updates for Multiple Vulnerabilities

Original release date: February 12, 2013
Last revised: --

Systems Affected

* Adobe Flash Player 11.5.502.149 and earlier versions for Windows and Macintosh
* Adobe Flash Player 11.2.202.262 and earlier versions for Linux
* Adobe Flash Player 11.1.115.37 and earlier versions for Android 4.x
* Adobe Flash Player 11.1.111.32 and earlier versions for Android 3.x and 2.x
* Adobe AIR 3.5.0.1060 and earlier versions
* Adobe AIR 3.5.0.1060 SDK and earlier versions
* Adobe Shockwave Player 11.6.8.638 and earlier versions for Windows and Macintosh

Overview

Select Adobe software products contain multiple vulnerabilities.
Adobe has released updates to address these vulnerabilities.

Description

Adobe Security Bulletin APSB13-05 and APSB13-06 describe multiple
vulnerabilities in Adobe software. Adobe has released updates to
address the vulnerabilities.

Impact

A remote, unauthenticated attacker could execute arbitrary code,
cause a denial of service, or gain unauthorized access to your
files or system.

Solution

Apply Updates

Adobe has provided updates for these vulnerabilities in Adobe
Security Bulletin APSB13-05 and APSB13-06.

References

* APSB13-05: Security updates available for Adobe Flash Player
<https://www.adobe.com/support/security/bulletins/apsb13-05.html>

* APSB13-06: Security updates available for Adobe Shockwave Player
<https://www.adobe.com/support/security/bulletins/apsb13-06.html>

Revision History

February 12, 2013: Initial release

____________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA13-043A Feedback VU#689711" in
the subject.
____________________________________________________________________

Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/cas/techalerts/TA13-043A.html

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBURqlO3dnhE8Qi3ZhAQIG2AgAjPa1V2DVAU2uHq3gkbyiBk7EN7AQc1WB
/GHGnyG+faN5+kToZu8ogkr/sNwWwBmlYwAUcIJ2JzA8O+0W2vG242c0HiAIecin
OevDgE830U0JDQcKukSqaEShA3a+UFCM5JnDn+qmsaG8jessCjHR2zmBpLSOhNa4
seCbxjVtyCe0RxxX4AjQD5cefgOGxblF5t2hjvrSe6TehUU8Zr9A5mnRfKiir4BO
iQhxIWP9N9rhPj+pdTE4ZLWLEyewvPmlMvEEtgU2CgRErvwYZlkKzEcLgV319oUO
wsdVF/M3HBVwrJGjuxUeHrBIxTto6JYq+df/mgQGA22VG95p28me0g==
=ADH6
-----END PGP SIGNATURE-----

 

TOP