Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.0221 Security updates available for Adobe Flash Player 21 February 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Adobe Flash Player Adobe AIR Publisher: Adobe Operating System: Windows Linux variants OS X Android Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-0502 CVE-2014-0499 CVE-2014-0498 Original Bulletin: http://helpx.adobe.com/security/products/flash-player/apsb14-07.html - --------------------------BEGIN INCLUDED TEXT-------------------- Adobe Security Bulletin Security updates available for Adobe Flash Player Release date: February 20, 2014 Vulnerability identifier: APSB14-07 Priority: See table below CVE number: CVE-2014-0498, CVE-2014-0499, CVE-2014-0502 Platform: All Platforms Summary Adobe has released security updates for Adobe Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.336 and earlier versions for Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe is aware of reports that an exploit for CVE-2014-0502 exists in the wild, and recommends users update their product installations to the latest versions: * Users of Adobe Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh should update to Adobe Flash Player 12.0.0.70 * Users of Adobe Flash Player 11.2.202.336 and earlier versions for Linux should update to Adobe Flash Player 11.2.202.341. * Adobe Flash Player 12.0.0.44 installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Adobe Flash Player 12.0.0.70 for Windows, Macintosh and Linux. * Adobe Flash Player 12.0.0.44 installed with Internet Explorer 10 will automatically be updated to the latest Internet Explorer 10 version, which will include Adobe Flash Player 12.0.0.70 for Windows 8.0. * Adobe Flash Player 12.0.0.44 installed with Internet Explorer 11 will automatically be updated to the latest Internet Explorer 11 version, which will include Adobe Flash Player 12.0.0.70 for Windows 8.1. * Users of Adobe AIR 4.0.0.1390 and earlier versions for Android should update to Adobe AIR 4.0.0.1628. * Users of the Adobe AIR 4.0.0.1390 SDK and earlier versions should update to the Adobe AIR 4.0.0.1628 SDK. * Users of the Adobe AIR 4.0.0.1390 SDK & Compiler and earlier versions should update to the Adobe AIR 4.0.0.1628 SDK & Compiler. Affected software versions * Adobe Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh * Adobe Flash Player 11.2.202.336 and earlier versions for Linux * Adobe AIR 4.0.0.1390 and earlier versions for Android * Adobe AIR 3.9.0.1390 SDK and earlier versions * Adobe AIR 3.9.0.1390 SDK & Compiler and earlier versions To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system. To verify the version of Adobe Flash Player for Android, go to Settings > Applications > Manage Applications > Adobe Flash Player x.x. To verify the version of Adobe AIR installed on your system, follow the instructions in the Adobe AIR TechNote. Solution Adobe recommends users update their software installations by following the instructions below: * Adobe recommends users of Adobe Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh update to the newest version 12.0.0.70 by downloading it from the Adobe Flash Player Download Center, or via the update mechanism within the product when prompted. * Adobe recommends users of Adobe Flash Player 11.2.202.336 and earlier versions for Linux update to Adobe Flash Player 11.2.202.341 by downloading it from the Adobe Flash Player Download Center. * For users of Flash Player 11.7.700.261 and earlier versions for Windows and Macintosh, who cannot update to Flash Player 12.0.0.44, Adobe has made available the update Flash Player 11.7.700.269, which can be downloaded here. * Adobe Flash Player 12.0.0.44 installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Adobe Flash Player 12.0.0.70 for Windows, Macintosh and Linux. * Adobe Flash Player 12.0.0.44 installed with Internet Explorer 10 will automatically be updated to the latest Internet Explorer 10 version, which will include Adobe Flash Player 12.0.0.70 for Windows 8.0. * Adobe Flash Player 12.0.0.44 installed with Internet Explorer 11 will automatically be updated to the latest Internet Explorer 11 version, which will include Adobe Flash Player 12.0.0.70 for Windows 8.1. * Users of the Adobe AIR 4.0.0.1390 SDK should update to the Adobe AIR 4.0.0.1628 SDK. * Users of the Adobe AIR 4.0.0.1390 SDK & Compiler and earlier versions should update to the Adobe AIR 4.0.0.1680 SDK & Compiler. * Users of the Adobe AIR 4.0.0.1390 and earlier versions for Android should update to Adobe AIR 4.0.0.1628 by browsing to Google play on an Android device. Priority and severity ratings Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version: Product Updated version Platform Priority rating Adobe Flash Player 12.0.0.70 Windows and Macintosh 1 12.0.0.70 Internet Explorer 10 1 for Windows 8.0 12.0.0.70 Internet Explorer 11 1 for Windows 8.1 12.0.0.70 Chrome for Windows, 1 Macintosh and Linux 11.7.700.269 Windows and Macintosh 1 11.2.202.341 Linux 3 Adobe AIR 4.0.0.1628 Android 3 Adobe AIR SDK and Compiler 4.0.0.1628 Windows and Macintosh 3 Adobe AIR SDK 4.0.0.1628 Windows and Macintosh 3 These updates address critical vulnerabilities in the software. Details Adobe has released security updates for Adobe Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.336 and earlier versions for Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe is aware of reports that an exploit for CVE-2014-0502 exists in the wild, and recommends users update their product installations to the latest versions: * Users of Adobe Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh should update to Adobe Flash Player 12.0.0.70 * Users of Adobe Flash Player 11.2.202.336 and earlier versions for Linux should update to Adobe Flash Player 11.2.202.341. * Adobe Flash Player 12.0.0.44 installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Adobe Flash Player 12.0.0.70 for Windows, Macintosh and Linux. * Adobe Flash Player 12.0.0.44 installed with Internet Explorer 10 will automatically be updated to the latest Internet Explorer 10 version, which will include Adobe Flash Player 12.0.0.70 for Windows 8.0. * Adobe Flash Player 12.0.0.44 installed with Internet Explorer 11 will automatically be updated to the latest Internet Explorer 11 version, which will include Adobe Flash Player 12.0.0.70 for Windows 8.1. * Users of Adobe AIR 4.0.0.1390 and earlier versions for Android should update to Adobe AIR 4.0.0.1628. * Users of the Adobe AIR 4.0.0.1390 SDK and earlier versions should update to the Adobe AIR 4.0.0.1628 SDK. * Users of the Adobe AIR 4.0.0.1390 SDK & Compiler and earlier versions should update to the Adobe AIR 4.0.0.1628 SDK & Compiler. These updates resolve a stack overflow vulnerability that could result in arbitrary code execution (CVE-2014-0498). These updates resolve a memory leak vulnerability that could be used to defeat memory address layout randomization (CVE-2014-0499). These updates resolve a double free vulnerability that could result in arbitrary code execution (CVE-2014-0502). Affected Software Recommended Player Update Availability Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh 12.0.0.70 Flash Player Download Center Flash Player 12.0.0.44 and earlier versions (network distribution) 12.0.0.70 Flash Player Licensing Flash Player 11.2.202.336 and earlier for Linux 11.2.202.336 Flash Player Download Center Flash Player 12.0.0.44 and earlier for Chrome (Windows, Macintosh and Linux) 12.0.0.70 Google Chrome Releases Flash Player 12.0.0.44 and earlier in Internet Explorer 10 for Windows 8.0 12.0.0.70 Microsoft Security Advisory Flash Player 12.0.0.44 and earlier in Internet Explorer 11 for Windows 8.1 12.0.0.70 Microsoft Security Advisory AIR 4.0.0.1390 and earlier for Android 4.0.0.1628 Google Play AIR 4.0.0.1390 SDK & Compiler 4.0.0.1628 AIR SDK Download AIR 4.0.0.1390 SDK 4.0.0.1628 AIR SDK Download Acknowledgments Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers: * Wen Guanxing of Venustech (CVE-2014-0498, CVE-2014-0499) * The Google Security Team and FireEye (CVE-2014-0502) - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUwamXhLndAQH1ShLAQLwTQ//anYVfWvSOKJNoBW8+dgzwVkldcGb7Zu2 /Ypn6GJhW4v7i9/R+bvRNIhXSF2Ibo+/b1OpJB5WhJuBPr8uM+OzM5vneyLD7iT0 dTAB4S+goSKQ5dkNXywdSnKxlA8R1pLtMd2BDJOZAKjLDtdfEgd/VY8ycBq1YZns 3VSGxFDQqkwdtEMQ2PKF66E/9SDWDsJX/zVc2cMPmWctQXMCIz3oPUsj42/zCaGR 4hhG2g/YREysTPZvxB2zuFTuMCcPI2jlvrUUamkIWbum/4Z2qEswcNneITvfQKH0 Mr6kCJl1r6bbYMUstZgFORG18sEbW9omysQe33w1pkZbBw0iGjCPO697u22Crypk hsdvpWHNWwNxS43jxAx86y1yNMGI+fcJyrYcYxHI9xJKEefksKjncjWo+CKuE0NX JgZ3Ci4HRv/5Ko4382VAMy3n53MeMRZ5bNcCHY4q0CefQ1mRHQZLyhTn4wXvdJLi /roI2m3jsruwG5YDhkKuECaQdGItATtL7GBuRoUyGnaxXV8c8Ud/95sr2b+AnNkY 36R8Br4Uo8R1q//ynr76tJvQMJeL/PIeQdbuyfCbkUCx7YWTsTjeyPZiWG3sUEAd i16UO7JH6Quww4qIkwpcgk/E0fjK/ySU9O1J8dko0dop90ZNFZJYG8xfFSaH+va0 9Hsbl6nc5ro= =ifrq -----END PGP SIGNATURE-----