Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.0167 Security updates available for Adobe Flash Player 8 February 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Adobe Flash Player Publisher: Adobe Operating System: Windows OS X Linux variants Android Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2013-0634 CVE-2013-0633 Original Bulletin: http://www.adobe.com/support/security/bulletins/apsb13-04.html Comment: Adobe have stated that they have received reports of both of these vulnerabilities being exploited in the wild. - --------------------------BEGIN INCLUDED TEXT-------------------- Security updates available for Adobe Flash Player Release date: February 7, 2013 Vulnerability identifier: APSB13-04 Priority: See table below CVE number: CVE-2013-0633, CVE-2013-0634 Platform: All Platforms Summary Adobe has released security updates for Adobe Flash Player 11.5.502.146 and earlier versions for Windows and Macintosh, Adobe Flash Player 11.2.202.261 and earlier versions for Linux, Adobe Flash Player 11.1.115.36 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.31 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system. Adobe is aware of reports that CVE-2013-0633 is being exploited in the wild in targeted attacks designed to trick the user into opening a Microsoft Word document delivered as an email attachment which contains malicious Flash (SWF) content. The exploit for CVE-2013-0633 targets the ActiveX version of Flash Player on Windows. Adobe is also aware of reports that CVE-2013-0634 is being exploited in the wild in attacks delivered via malicious Flash (SWF) content hosted on websites that target Flash Player in Firefox or Safari on the Macintosh platform, as well as attacks designed to trick Windows users into opening a Microsoft Word document delivered as an email attachment which contains malicious Flash (SWF) content. Adobe recommends users update their product installations to the latest versions: Users of Adobe Flash Player 11.5.502.146 and earlier versions for Windows and Macintosh should update to Adobe Flash Player 11.5.502.149. Users of Adobe Flash Player 11.2.202.261 and earlier versions for Linux should update to Adobe Flash Player 11.2.202.262. Flash Player installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Adobe Flash Player 11.5.31.139 for Windows, Macintosh and Linux. Flash Player installed with Internet Explorer 10 for Windows 8 will automatically be updated to the latest version of Internet Explorer 10, which will include Adobe Flash Player 11.3.379.14 for Windows. Users of Adobe Flash Player 11.1.115.36 and earlier versions on Android 4.x devices should update to Adobe Flash Player 11.1.115.37. Users of Adobe Flash Player 11.1.111.31 and earlier versions for Android 3.x and earlier versions should update to Flash Player 11.1.111.32. Affected software versions Adobe Flash Player 11.5.502.146 and earlier versions for Windows and Macintosh Adobe Flash Player 11.2.202.261 and earlier versions for Linux Adobe Flash Player 11.1.115.36 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.31 and earlier versions for Android 3.x and 2.x To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system. To verify the version of Adobe Flash Player for Android, go to Settings > Applications > Manage Applications > Adobe Flash Player x.x. Solution Adobe recommends users update their software installations by following the instructions below: Adobe recommends users of Adobe Flash Player 11.5.502.146 and earlier versions for Windows and Macintosh update to the newest version 11.5.502.149 by downloading it from the Adobe Flash Player Download Center. Users of Flash Player 11.2.x or later for Windows and users of Flash Player 11.3.x for Macintosh who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted. For users of Flash Player 10.3.183.50 and earlier versions for Windows and Macintosh, who cannot update to Flash Player 11.5.502.149, Adobe has made available the update Flash Player 10.3.183.51, which can be downloaded here. Adobe recommends users of Adobe Flash Player 11.2.202.261 and earlier versions for Linux update to Adobe Flash Player 11.2.202.262 by downloading it from the Adobe Flash Player Download Center. For users of Flash Player 10.3.183.50 and earlier versions for Linux, who cannot update to Flash Player 11.2.202.262, Adobe has made available the update Flash Player 10.3.183.51, which can be downloaded here. Flash Player installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Adobe Flash Player 11.5.31.139 for Windows, Macintosh and Linux. Flash Player installed with Internet Explorer 10 for Windows 8 will automatically be updated to the latest Internet Explorer 10 version, which will include Adobe Flash Player 11.3.379.14 for Windows. Users of Adobe Flash Player 11.1.115.36 and earlier versions on Android 4.x devices should update to Adobe Flash Player 11.1.115.37*. * Note: Applicable only for Android 4.x devices with Flash Player installed prior to August 15, 2012. Users of Adobe Flash Player 11.1.111.31 and earlier versions for Android 3.x and earlier versions should update to Flash Player 11.1.111.32*. * Note: Applicable only for Android 3.x devices and earlier with Flash Player installed prior to August 15, 2012. Priority and severity ratings Adobe categorizes these updates with the following priority ratings and recommends users update their installations to the newest versions: Product Updated version Platform Priority rating Adobe Flash Player 11.5.502.149 Windows and Macintosh 1 11.2.202.262 Linux 3 11.1.115.37 Android 4.x 3 11.1.111.32 Android 3.x and 2.x 3 These updates address critical vulnerabilities in the software. Details Adobe has released security updates for Adobe Flash Player 11.5.502.146 and earlier versions for Windows and Macintosh, Adobe Flash Player 11.2.202.261 and earlier versions for Linux, Adobe Flash Player 11.1.115.36 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.31 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system. Adobe is aware of reports that CVE-2013-0633 is being exploited in the wild in targeted attacks designed to trick the user into opening a Microsoft Word document delivered as an email attachment which contains malicious Flash (SWF) content. The exploit for CVE-2013-0633 targets the ActiveX version of Flash Player on Windows. Adobe is also aware of reports that CVE-2013-0634 is being exploited in the wild in attacks delivered via malicious Flash (SWF) content hosted on websites that target Flash Player in Firefox or Safari on the Macintosh platform, as well as attacks designed to trick Windows users into opening a Microsoft Word document delivered as an email attachment which contains malicious Flash (SWF) content. Adobe recommends users update their product installations to the latest versions: Users of Adobe Flash Player 11.5.502.146 and earlier versions for Windows and Macintosh should update to Adobe Flash Player 11.5.502.149. Users of Adobe Flash Player 11.2.202.261 and earlier versions for Linux should update to Adobe Flash Player 11.2.202.262. Flash Player installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Adobe Flash Player 11.5.31.139 for Windows, Macintosh and Linux. Flash Player installed with Internet Explorer 10 for Windows 8 will automatically be updated to the latest version of Internet Explorer 10, which will include Adobe Flash Player 11.3.379.14 for Windows. Users of Adobe Flash Player 11.1.115.36 and earlier versions on Android 4.x devices should update to Adobe Flash Player 11.1.115.37. Users of Adobe Flash Player 11.1.111.31 and earlier versions for Android 3.x and earlier versions should update to Flash Player 11.1.111.32. This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2013-0633). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2013-0634). Affected software Recommended player update Availability Flash Player 11.5.502.146 and earlier 11.5.502.149 Flash Player Download Center versions for Windows and Macintosh Flash Player 11.5.502.146 and earlier 11.5.502.149 Flash Player Licensing versions for Windows and Macintosh - network distribution Flash Player 11.2.202.261 and earlier 11.2.202.262 Flash Player Download Center for Linux Flash Player 11.1.115.36 and earlier 11.1.115.37 Applicable only for Android 4.x devices for Android 4.x with Flash Player installed prior to August 15, 2012. Flash Player 11.1.111.31 and earlier 11.1.111.32 Update to devices that already for Android 3.x and 2.x have Flash Player installed prior to August 15, 2012. Flash Player 11.5.31.137 and earlier 11.5.31.139 Google Chrome Releases for Chrome users (Windows, Macintosh and Linux) Flash Player 11.3.378.5 and earlier 11.3.379.14 Windows Download Center in Internet Explorer 10 for Windows 8 Acknowledgments Adobe would like to thank the following individuals and organization for reporting the relevant issues and for working with Adobe to help protect our customers: CVE-2013-0633: Sergey Golovanov and Alexander Polyakov of Kaspersky Labs CVE-2013-0634: Steven Adair of the Shadowserver Foundation W of the Shadowserver Foundation MITRE Lockheed Martin Computer Incident Response Team - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBURRNfO4yVqjM2NGpAQKFSw//e1D3vxtSVZ7dYFFcGG+/+9uHGfTQhQLy shvjs8QxLM7e//9qiuIWPtCdMXcLrVQDgocHF6LWKrlf0YMw0aeywbl36yWR707W wxxGagGa/fcy8NlrZCXIErfRdlVrITAuovH8F0axhZYiNPudqZhAVh8RAFyU0eow rRIHVW6BNN4XKIaKGmySsgTigMKyC+yf159u47F90v9PUx1uZu430hHyE1AfWDu4 It1QGfV7EulNIVIF4RIHnSTt+zGTmivmugegH5l7Jhe2+UjCu2C+z+J8x326pvTf s0WrodyvB+VSj4oKrv20KNkeDRCzuQL1HykPR+3awzoJRRyaaoIwPpZS4+xo1oKz tE0xbOjPkQ3Xr0lKMtOow+yCvjBfpEoQXMPJ+7knUHG4omRQSfv0+N+3a5MkYC9W jJLga5c/0gCNHKwiKzI2Cm0IyslNfxGoUZJUSSBqbWGuz4ecfh+urDCXcrXzrq4Y ogWpZ1UfFl/bQ38Vt5qxN0gCAm/KE7UD/HRHSsLn9dNnpknjV294qTqOYFvkDEcm PEqSpzsf5EIdQoY9FqxZgTSveleKsBvXtr6ZUT8QPjHVESnIfirF9W3d7fgU9K7/ l0EklEBRyFHvlucOKk7EoK/NfPk5fE6GydNaX/ftPyfGJkAg8QKjWehXFVlVieon 5buMrKML7Dc= =1Uh/ -----END PGP SIGNATURE-----