Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.2222 Security updates available for Adobe Flash Player 26 November 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Adobe Flash Player Publisher: Adobe Operating System: Windows OS X Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-8439 Original Bulletin: http://helpx.adobe.com/security/products/flash-player/apsb14-26.html Comment: Active exploits of this vulnerability have been identified in the wild: https://www.f-secure.com/weblog/archives/00002768.html - --------------------------BEGIN INCLUDED TEXT-------------------- Adobe Security Bulletin Security updates available for Adobe Flash Player Release date: November 25, 2014 Vulnerability identifier: APSB14-26 Priority: See table below CVE number: CVE-2014-8439 Platform: All Platforms Summary Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates provide additional hardening against CVE-2014-8439, which was mitigated in the October 14, 2014 release (reference http://helpx.adobe.com/security/products/flash-player/apsb14-22.html). Adobe recommends users update their product installations to the latest versions: Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 15.0.0.239. Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.258. Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.424. Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x will be automatically updated to the current version. Affected software versions Adobe Flash Player 15.0.0.223 and earlier versions Adobe Flash Player 13.0.0.252 and earlier 13.x versions Adobe Flash Player 11.2.202.418 and earlier versions for Linux To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system. Solution Adobe recommends users update their software installations by following the instructions below: Adobe recommends users of the Adobe Flash Player desktop runtime for Windows and Macintosh update to Adobe Flash Player 15.0.0.239 by visiting the Adobe Flash Player Download Center, or via the update mechanism within the product when prompted. Adobe recommends users of the Adobe Flash Player Extended Support Release should update to version 13.0.0.258 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html. Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.424 by visiting the Adobe Flash Player Download Center. Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 15.0.0.239 on Windows and 15.0.0.242 on Macintosh. Adobe Flash Player installed with Internet Explorer for Windows 8.x will be automatically updated to the latest version, which will include Adobe Flash Player 15.0.0.239. Priority and severity ratings Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version: Product Affected versions Platform Priority rating Adobe Flash Player Desktop 15.0.0.223 and earlier Windows and Macintosh 2 Runtime Adobe Flash Player Extended 13.0.0.252 and earlier Windows and Macintosh 2 Support Release Adobe Flash Player for 15.0.0.223 and earlier Windows, Macintosh and Linux 2 Google Chrome Adobe Flash Player for 15.0.0.223 and earlier Windows 8.0 and 8.1 2 Internet Explorer 10 and Internet Explorer 11 Adobe Flash Player 11.2.202.418 and earlier Linux 3 These updates address a critical vulnerability in the software. Details Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates provide additional hardening against CVE-2014-8439, which was mitigated in the October 14, 2014 release (reference http://helpx.adobe.com/security/products/flash-player/apsb14-22.html). Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 15.0.0.239. Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.258. Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.424. Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x will be automatically updated to the current version. These updates provide additional hardening against a vulnerability in the handling of a dereferenced memory pointer that could lead to code execution (CVE-2014-8439). A mitigation was previously introduced for this issue in the October 14, 2014 release. Affected Software Recommended Player Update Availability Flash Player Desktop Runtime 15.0.0.239 Flash Player Download Center Flash Player Distribution Flash Player Extended Support 13.0.0.258 Extended Support Release Flash Player for Linux 11.2.202.424 Flash Player Download Center Flash Player for Google Chrome 15.0.0.239 (Windows) 15.0.0.242 (Macintosh) Google Chrome Releases Flash Player for Internet 15.0.0.239 Microsoft Security Advisory Explorer 10 and Internet Explorer 11 Acknowledgments Adobe would like to thank the following individuals and organizations for reporting the relevant issue and for working with Adobe to help protect our customers: Sébastien Duquette of ESET, Timo Hirvonen of F-Secure and Kafeine (CVE-2014-8439) - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVHVDbhLndAQH1ShLAQLIPxAAtEswfgt/MujIM8Fq0wEWswCPq0aSq7r0 biED4IkJNthQ4CW57niR65wA0dPExdtsaoPmucGlBR0oLfAVhqfAVNWBcG9XzuCN XuRLyuk+ajOBpjg69MdnXF/z+v3ioRrVPeBNCFaKqEA+7IbaOxajTMjSa6GJVyeh 1TVh3jMUvlcJdfFHElM4/7tnIXNZ3dyPn9ZsXmKERIkq4wBPd+nfDY3Etme+rLt9 huJSVYvBlRQt6iDf0PYLEY0pqX/l+MVI4b4+cqWey5wGqXXKQTaTM99XxBMsdKV0 5TVjKDvbhcdQf68Vfgn/8yLOnwikUSw/auau7VZ6xUb1cp58bOotuUvxJj4UbdLz BYev8nKHEv79TmTUdwthLgS77WYifOgQCnekIOcU+y1/3PQnsTOK5gytyJ+Wp3ZF 5iEOcK01P5/Yyf1/nyp82RxRdLKQZSJJl/QQ/zHSz45DHyqwFXu7gWKv7OBxn2ot 6CSYw85sbP1URWABgcHFE7YRpGOhz1yb7LAbE6mpoQqOpQpTaxXhK8u6wY+xO3nz WJwu6fxJi8S60GqrJCKm/edCHsLfsHPHvYHLwcT7KZD0hVgGBzZ7qWQE5tFIQ1tY tQCwXRN6oUZXjYi7EA0s8Q5aKGHOqFSDqyX0hqpDPyIKVYipRbFAxXE/rR/Oz89v AYbpbsZAwvo= =vOUe -----END PGP SIGNATURE-----