-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0221
             Security updates available for Adobe Flash Player
                             21 February 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Adobe Flash Player
                   Adobe AIR
Publisher:         Adobe
Operating System:  Windows
                   Linux variants
                   OS X
                   Android
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0502 CVE-2014-0499 CVE-2014-0498

Original Bulletin: 
   http://helpx.adobe.com/security/products/flash-player/apsb14-07.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Adobe Security Bulletin

Security updates available for Adobe Flash Player

Release date: February 20, 2014

Vulnerability identifier: APSB14-07

Priority: See table below

CVE number: CVE-2014-0498, CVE-2014-0499, CVE-2014-0502

Platform: All Platforms

Summary

Adobe has released security updates for Adobe Flash Player 12.0.0.44 and 
earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.336
and earlier versions for Linux. These updates address vulnerabilities that 
could potentially allow an attacker to take control of the affected system. 
Adobe is aware of reports that an exploit for CVE-2014-0502 exists in the 
wild, and recommends users update their product installations to the latest 
versions:

* Users of Adobe Flash Player 12.0.0.44 and earlier versions for Windows and
Macintosh should update to Adobe Flash Player 12.0.0.70

* Users of Adobe Flash Player 11.2.202.336 and earlier versions for Linux 
should update to Adobe Flash Player 11.2.202.341.

* Adobe Flash Player 12.0.0.44 installed with Google Chrome will 
automatically be updated to the latest Google Chrome version, which will 
include Adobe Flash Player 12.0.0.70 for Windows, Macintosh and Linux.

* Adobe Flash Player 12.0.0.44 installed with Internet Explorer 10 will 
automatically be updated to the latest Internet Explorer 10 version, which 
will include Adobe Flash Player 12.0.0.70 for Windows 8.0.

* Adobe Flash Player 12.0.0.44 installed with Internet Explorer 11 will 
automatically be updated to the latest Internet Explorer 11 version, which 
will include Adobe Flash Player 12.0.0.70 for Windows 8.1.

* Users of Adobe AIR 4.0.0.1390 and earlier versions for Android should 
update to Adobe AIR 4.0.0.1628.

* Users of the Adobe AIR 4.0.0.1390 SDK and earlier versions should update 
to the Adobe AIR 4.0.0.1628 SDK.

* Users of the Adobe AIR 4.0.0.1390 SDK & Compiler and earlier versions 
should update to the Adobe AIR 4.0.0.1628 SDK & Compiler.

Affected software versions

* Adobe Flash Player 12.0.0.44 and earlier versions for Windows and 
Macintosh

* Adobe Flash Player 11.2.202.336 and earlier versions for Linux

* Adobe AIR 4.0.0.1390 and earlier versions for Android

* Adobe AIR 3.9.0.1390 SDK and earlier versions

* Adobe AIR 3.9.0.1390 SDK & Compiler and earlier versions

To verify the version of Adobe Flash Player installed on your system, access 
the About Flash Player page, or right-click on content running in Flash Player
and select "About Adobe (or Macromedia) Flash Player" from the menu. If you 
use multiple browsers, perform the check for each browser you have installed 
on your system.

To verify the version of Adobe Flash Player for Android, go to Settings > 
Applications > Manage Applications > Adobe Flash Player x.x.

To verify the version of Adobe AIR installed on your system, follow the 
instructions in the Adobe AIR TechNote.

Solution

Adobe recommends users update their software installations by following the 
instructions below:

* Adobe recommends users of Adobe Flash Player 12.0.0.44 and earlier 
versions for Windows and Macintosh update to the newest version 12.0.0.70 by 
downloading it from the Adobe Flash Player Download Center, or via the update
mechanism within the product when prompted.

* Adobe recommends users of Adobe Flash Player 11.2.202.336 and earlier 
versions for Linux update to Adobe Flash Player 11.2.202.341 by downloading it
from the Adobe Flash Player Download Center.

* For users of Flash Player 11.7.700.261 and earlier versions for Windows 
and Macintosh, who cannot update to Flash Player 12.0.0.44, Adobe has made 
available the update Flash Player 11.7.700.269, which can be downloaded here.

* Adobe Flash Player 12.0.0.44 installed with Google Chrome will 
automatically be updated to the latest Google Chrome version, which will 
include Adobe Flash Player 12.0.0.70 for Windows, Macintosh and Linux.

* Adobe Flash Player 12.0.0.44 installed with Internet Explorer 10 will 
automatically be updated to the latest Internet Explorer 10 version, which 
will include Adobe Flash Player 12.0.0.70 for Windows 8.0.

* Adobe Flash Player 12.0.0.44 installed with Internet Explorer 11 will 
automatically be updated to the latest Internet Explorer 11 version, which 
will include Adobe Flash Player 12.0.0.70 for Windows 8.1.

* Users of the Adobe AIR 4.0.0.1390 SDK should update to the Adobe AIR 
4.0.0.1628 SDK.

* Users of the Adobe AIR 4.0.0.1390 SDK & Compiler and earlier versions 
should update to the Adobe AIR 4.0.0.1680 SDK & Compiler.

* Users of the Adobe AIR 4.0.0.1390 and earlier versions for Android should
update to Adobe AIR 4.0.0.1628 by browsing to Google play on an Android 
device.

Priority and severity ratings

Adobe categorizes these updates with the following priority ratings and 
recommends users update their installation to the newest version:

Product 		Updated version 	Platform 		Priority rating

Adobe Flash Player 	12.0.0.70		Windows and Macintosh	1

  			12.0.0.70 		Internet Explorer 10 	1
						for Windows 8.0

  			12.0.0.70 		Internet Explorer 11 	1
						for Windows 8.1

  			12.0.0.70 		Chrome for Windows, 	1
						Macintosh and Linux 	

  			11.7.700.269 		Windows and Macintosh 	1

  			11.2.202.341 		Linux 			3

Adobe AIR 		4.0.0.1628 		Android 		3

Adobe AIR SDK and 
Compiler 		4.0.0.1628 		Windows and Macintosh 	3

Adobe AIR SDK 		4.0.0.1628 		Windows and Macintosh 	3

These updates address critical vulnerabilities in the software.

Details

Adobe has released security updates for Adobe Flash Player 12.0.0.44 and 
earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.336
and earlier versions for Linux. These updates address vulnerabilities that 
could potentially allow an attacker to take control of the affected system. 
Adobe is aware of reports that an exploit for CVE-2014-0502 exists in the 
wild, and recommends users update their product installations to the latest 
versions:

* Users of Adobe Flash Player 12.0.0.44 and earlier versions for Windows and
Macintosh should update to Adobe Flash Player 12.0.0.70

* Users of Adobe Flash Player 11.2.202.336 and earlier versions for Linux 
should update to Adobe Flash Player 11.2.202.341.

* Adobe Flash Player 12.0.0.44 installed with Google Chrome will 
automatically be updated to the latest Google Chrome version, which will 
include Adobe Flash Player 12.0.0.70 for Windows, Macintosh and Linux.

* Adobe Flash Player 12.0.0.44 installed with Internet Explorer 10 will 
automatically be updated to the latest Internet Explorer 10 version, which 
will include Adobe Flash Player 12.0.0.70 for Windows 8.0.

* Adobe Flash Player 12.0.0.44 installed with Internet Explorer 11 will 
automatically be updated to the latest Internet Explorer 11 version, which 
will include Adobe Flash Player 12.0.0.70 for Windows 8.1.

* Users of Adobe AIR 4.0.0.1390 and earlier versions for Android should 
update to Adobe AIR 4.0.0.1628.

* Users of the Adobe AIR 4.0.0.1390 SDK and earlier versions should update 
to the Adobe AIR 4.0.0.1628 SDK.

* Users of the Adobe AIR 4.0.0.1390 SDK & Compiler and earlier versions 
should update to the Adobe AIR 4.0.0.1628 SDK & Compiler.

These updates resolve a stack overflow vulnerability that could result in 
arbitrary code execution (CVE-2014-0498).

These updates resolve a memory leak vulnerability that could be used to defeat
memory address layout randomization (CVE-2014-0499).

These updates resolve a double free vulnerability that could result in 
arbitrary code execution (CVE-2014-0502).

Affected Software 		Recommended Player 		Update Availability

Flash Player 12.0.0.44 and 
earlier versions for Windows 
and Macintosh 			12.0.0.70 			Flash Player Download Center

Flash Player 12.0.0.44 and 
earlier versions (network 
distribution) 			12.0.0.70 			Flash Player Licensing

Flash Player 11.2.202.336 
and earlier for Linux 		11.2.202.336 			Flash Player Download Center

Flash Player 12.0.0.44 and 
earlier for Chrome (Windows, 
Macintosh and Linux) 		12.0.0.70			Google Chrome Releases

Flash Player 12.0.0.44 and 
earlier in Internet Explorer 
10 for Windows 8.0 		12.0.0.70			Microsoft Security Advisory

Flash Player 12.0.0.44 and 
earlier in Internet Explorer 
11 for Windows 8.1 		12.0.0.70			Microsoft Security Advisory

AIR 4.0.0.1390 and earlier 
for Android 			4.0.0.1628 			Google Play

AIR 4.0.0.1390 SDK & Compiler 	4.0.0.1628 			AIR SDK Download

AIR 4.0.0.1390 SDK 		4.0.0.1628 			AIR SDK Download

Acknowledgments

Adobe would like to thank the following individuals and organizations for 
reporting the relevant issues and for working with Adobe to help protect our 
customers:

* Wen Guanxing of Venustech (CVE-2014-0498, CVE-2014-0499)

* The Google Security Team and FireEye (CVE-2014-0502)

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ifrq
-----END PGP SIGNATURE-----