Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.0611.2 Security updates available for Adobe Flash Player 8 May 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Adobe Flash Player Publisher: Adobe Operating System: Windows OS X Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Unauthorised Access -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2015-0342 CVE-2015-0341 CVE-2015-0340 CVE-2015-0339 CVE-2015-0338 CVE-2015-0337 CVE-2015-0336 CVE-2015-0335 CVE-2015-0334 CVE-2015-0333 CVE-2015-0332 Original Bulletin: https://helpx.adobe.com/security/products/flash-player/apsb15-05.html Comment: An exploit has been made publicly available for CVE-2015-0336 Revision History: May 8 2015: Added versions of Adobe AIR that address the CVEs referenced in this bulletin and public release of an exploit for CVE-2015-0336 March 13 2015: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- Adobe Security Bulletin Security updates available for Adobe Flash Player Release date: March 12, 2015 Last Updated: April 15, 2015 Vulnerability identifier: APSB15-05 Priority: See table below CVE number: CVE-2015-0332, CVE-2015-0333, CVE-2015-0334, CVE-2015-0335, CVE-2015-0336, CVE-2015-0337, CVE-2015-0338, CVE-2015-0339, CVE-2015-0340, CVE-2015-0341, CVE-2015-0342 Platform: All Platforms Summary Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions: Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 17.0.0.134. Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.277. Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.451. Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 17.0.0.134. Users of the Adobe AIR desktop runtime should update to version 17.0.0.144. Users of the Adobe AIR SDK and AIR SDK & Compiler should update to version 17.0.0.144. Users of Adobe AIR for Android should update to version 17.0.0.144. Affected software versions Adobe Flash Player 16.0.0.305 and earlier versions Adobe Flash Player 13.0.0.269 and earlier 13.x versions Adobe Flash Player 11.2.202.442 and earlier 11.x versions AIR Desktop runtime 17.0.0.124 and earlier versions AIR SDK 17.0.0.124 and earlier versions AIR SDK & Compiler 17.0.0.124 and earlier versions AIR Android 17.0.0.124 and earlier versions To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system. To verify the version of Adobe AIR installed on your system, follow the instructions in the Adobe AIR TechNote. Solution Adobe recommends users update their software installations by following the instructions below: Adobe recommends users of the Adobe Flash Player desktop runtime for Windows and Macintosh update to Adobe Flash Player 17.0.0.134 by visiting the Adobe Flash Player Download Center, or via the update mechanism within the product when prompted. Adobe recommends users of the Adobe Flash Player Extended Support Release should update to version 13.0.0.277 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html. Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.451 by visiting the Adobe Flash Player Download Center. Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 17.0.0.134. Adobe Flash Player installed with Internet Explorer for Windows 8.x will be automatically updated to the latest version, which will include Adobe Flash Player 17.0.0.134. Adobe recommends users of the Adobe AIR desktop runtime should update to version 17.0.0.144 by visiting the Adobe AIR Download Center. Adobe recommends users of the Adobe AIR SDK should update to version 17.0.0.144 by visiting the Adobe AIR Download Center. Adobe recommends users of the Adobe AIR SDK & Compiler should update to version 17.0.0.144 by visiting the Adobe AIR Download Center. Adobe recommends users of the Adobe AIR for Android should update to Adobe AIR 17.0.0.144 by downloading the latest version from the Google Play store. Priority and severity ratings Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version: Product Affected versions Platform Priority rating Adobe Flash Player Desktop Runtime 16.0.0.305 and earlier Windows and Macintosh 1 Adobe Flash Player Extended Support Release 13.0.0.269 and earlier Windows and Macintosh 1 Adobe Flash Player for Google Chrome 16.0.0.305 and earlier Windows,Macintosh 1 and Linux Adobe Flash Player for Internet Explorer 10 16.0.0.305 and earlier Windows 8.0 and 8.1 1 and Internet Explorer 11 Adobe Flash Player 11.2.202.442 and Linux 3 earlier AIR Desktop Runtime 17.0.0.124 and earlier Windows and Macintosh 3 AIR SDK 17.0.0.124 and earlier Windows, Macintosh, 3 Android and iOS AIR SDK & Compiler 17.0.0.124 and earlier Windows, Macintosh, 3 Android and iOS AIR for Android 17.0.0.124 and earlier Android 3 These updates address critical vulnerabilities in the software. Details Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions: Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 17.0.0.134. Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.277. Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.451. Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 17.0.0.134. Users of the Adobe AIR desktop runtime should update to version 17.0.0.144. Users of the Adobe AIR SDK and AIR SDK and Compiler should update to version 17.0.0.144. Users of Adobe AIR for Android should update to version 17.0.0.144. These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-0332, CVE-2015-0333, CVE-2015-0335, CVE-2015-0339). These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2015-0334, CVE-2015-0336). These updates resolve a vulnerability that could lead to a cross-domain policy bypass (CVE-2015-0337). These updates resolve a vulnerability that could lead to a file upload restriction bypass (CVE-2015-0340). These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-0338). These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-0341, CVE-2015-0342). Affected Software Recommended Player Update Availability Flash Player Desktop Runtime 17.0.0.134 Flash Player Download Center Flash Player Distribution Flash Player Extended Support Release 13.0.0.277 Extended Support Flash Player for Linux 11.2.202.451 Flash Player Download Center Flash Player for Google Chrome 17.0.0.134 Google Chrome Releases Flash Player for Internet Explorer 10 11 17.0.0.134 Microsoft Security Advisory and Internet Explorer AIR desktop runtime 17.0.0.144 AIR Download Center AIR SDK 17.0.0.144 AIR SDK Download AIR SDK & Compiler 17.0.0.144 AIR SDK Download AIR for Android 17.0.0.144 Google Play Acknowledgments Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers: Chris Evans of Google Project Zero (CVE-2015-0332, CVE-2015-0335) Yuki Chen as well as Xiaoning Li of Intel Labs and Haifei Li of McAfee Labs (CVE-2015-0333) Natalie Silvanovich, working with Google Project Zero (CVE-2015-0334, CVE-2015-0336) Soroush Dalili of NCC Group (CVE-2015-0337, CVE-2015-0340) Mark Brand of Google Project Zero (CVE-2015-0339) bilou working with HP's Zero Day Initiative (CVE-2015-0341) Jihui Lu of KeenTeam (@K33nTeam), working with the Chromium vulnerability reward program (CVE-2015-0342) Revisions April 15, 2015: Added versions of Adobe AIR that address the CVEs referenced in this bulletin. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVUwcwBLndAQH1ShLAQJt3g/8CDlSwVXS5BxZF34WHCkKYR7rNU3uSH26 mgeLLrEwJDGC8UvxjX/GSudhOIdDqxh/dMNgRX18UgHIPC6Xf/dc8B/bgIb4+3bc UdKclgzJOOq+HeVJcOaR8yJic0yLOX9snVdu5MguvS8N0lXQ6UqdIOHbIV4vDayz zYUDpuNo5zHMzAeMumMDS6XZ/PQh5682P2Z3s/SXsKuNxq6yz3I38TDOp6skeESm VhTc5+tTRmfvw4+A+lVWrSAoAPTMubYeudJ+L+Sp39++KjKmkxwMWK5ZtnyktAAb LtFVykrnnLjm4OKe36JpoN5/lhyrxoQR0fAMqeVZ5Wh4SdQSq8QyTxKr1OKmd6gt 3Yw8DU1cyLBS9NoHSCu/DNjobeIYd6W1A8CMw/ab9CJga24QR+euqHLHoxtG2JS5 lOlRrV3I0b0OYLfGiFK0Y2Mitky8v849iAQ2bk27gaTfvl9283gp5iv0Ll5JBq1e VPP2onaPWUaLcHE5n3nPt83rf3Hs39ZGNeIdDY333utUZ2bO9Z3kiBh3NjEFp1vH pde6/e5NHp/aRk4pS422eSovyZ8OsTkMhpp1Taqt8jDBqpKT27HiVgOYRFdPI+T7 JZpCPBLiC4GU93PZsE40H8BBJDYnWdnWs29f/u2SuApPSKYPwHdf/lmcA1ICyNdg GMgg3GTJMtc= =bjWb -----END PGP SIGNATURE-----