-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2015.0611.2
             Security updates available for Adobe Flash Player
                                8 May 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Adobe Flash Player
Publisher:         Adobe
Operating System:  Windows
                   OS X
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Unauthorised Access             -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-0342 CVE-2015-0341 CVE-2015-0340
                   CVE-2015-0339 CVE-2015-0338 CVE-2015-0337
                   CVE-2015-0336 CVE-2015-0335 CVE-2015-0334
                   CVE-2015-0333 CVE-2015-0332 

Original Bulletin: 
   https://helpx.adobe.com/security/products/flash-player/apsb15-05.html

Comment: An exploit has been made publicly available for CVE-2015-0336

Revision History:  May    8 2015: Added versions of Adobe AIR that address 
                                  the CVEs referenced in this bulletin and 
                                  public release of an exploit for 
                                  CVE-2015-0336
                   March 13 2015: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Adobe Security Bulletin

Security updates available for Adobe Flash Player

Release date: March 12, 2015

Last Updated: April 15, 2015

Vulnerability identifier: APSB15-05

Priority: See table below

CVE number: CVE-2015-0332, CVE-2015-0333, CVE-2015-0334, CVE-2015-0335, 
CVE-2015-0336, CVE-2015-0337, CVE-2015-0338, CVE-2015-0339, CVE-2015-0340, 
CVE-2015-0341, CVE-2015-0342

Platform: All Platforms

Summary

Adobe has released security updates for Adobe Flash Player for Windows, 
Macintosh and Linux. These updates address vulnerabilities that could 
potentially allow an attacker to take control of the affected system. Adobe 
recommends users update their product installations to the latest versions:

Users of the Adobe Flash Player desktop runtime for Windows and Macintosh 
should update to Adobe Flash Player 17.0.0.134.

Users of the Adobe Flash Player Extended Support Release should update to 
Adobe Flash Player 13.0.0.277.

Users of Adobe Flash Player for Linux should update to Adobe Flash Player 
11.2.202.451.

Adobe Flash Player installed with Google Chrome, as well as Internet Explorer
on Windows 8.x, will automatically update to version 17.0.0.134.

Users of the Adobe AIR desktop runtime should update to version 17.0.0.144.

Users of the Adobe AIR SDK and AIR SDK & Compiler should update to version 
17.0.0.144.

Users of Adobe AIR for Android should update to version 17.0.0.144.

Affected software versions

   Adobe Flash Player 16.0.0.305 and earlier versions

   Adobe Flash Player 13.0.0.269 and earlier 13.x versions

   Adobe Flash Player 11.2.202.442 and earlier 11.x versions

   AIR Desktop runtime 17.0.0.124 and earlier versions

   AIR SDK 17.0.0.124 and earlier versions

   AIR SDK & Compiler 17.0.0.124 and earlier versions

   AIR Android 17.0.0.124 and earlier versions

To verify the version of Adobe Flash Player installed on your system, access 
the About Flash Player page, or right-click on content running in Flash Player
and select "About Adobe (or Macromedia) Flash Player" from the menu. If you 
use multiple browsers, perform the check for each browser you have installed 
on your system.

To verify the version of Adobe AIR installed on your system, follow the 
instructions in the Adobe AIR TechNote.

Solution

Adobe recommends users update their software installations by following the 
instructions below:

Adobe recommends users of the Adobe Flash Player desktop runtime for Windows 
and Macintosh update to Adobe Flash Player 17.0.0.134 by visiting the Adobe 
Flash Player Download Center, or via the update mechanism within the product 
when prompted.

Adobe recommends users of the Adobe Flash Player Extended Support Release 
should update to version 13.0.0.277 by visiting 
http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html.

Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash 
Player 11.2.202.451 by visiting the Adobe Flash Player Download Center.

Adobe Flash Player installed with Google Chrome will be automatically updated
to the latest Google Chrome version, which will include Adobe Flash Player 
17.0.0.134.

Adobe Flash Player installed with Internet Explorer for Windows 8.x will be 
automatically updated to the latest version, which will include Adobe Flash 
Player 17.0.0.134.

Adobe recommends users of the Adobe AIR desktop runtime should update to 
version 17.0.0.144 by visiting the Adobe AIR Download Center.

Adobe recommends users of the Adobe AIR SDK should update to version 
17.0.0.144 by visiting the Adobe AIR Download Center.

Adobe recommends users of the Adobe AIR SDK & Compiler should update to 
version 17.0.0.144 by visiting the Adobe AIR Download Center.

Adobe recommends users of the Adobe AIR for Android should update to Adobe AIR
17.0.0.144 by downloading the latest version from the Google Play store.

Priority and severity ratings

Adobe categorizes these updates with the following priority ratings and 
recommends users update their installation to the newest version:

Product 					Affected versions 	Platform 		Priority rating

Adobe Flash Player Desktop Runtime 		16.0.0.305 and earlier	Windows and Macintosh	1

Adobe Flash Player Extended Support Release 	13.0.0.269 and earlier 	Windows and Macintosh	1 

Adobe Flash Player for Google Chrome 		16.0.0.305 and earlier 	Windows,Macintosh	1 
									and Linux

Adobe Flash Player for Internet Explorer 10 	16.0.0.305 and earlier 	Windows 8.0 and 8.1 	1
and Internet Explorer 11 

Adobe Flash Player 				11.2.202.442 and 	Linux 			3
						earlier 

AIR Desktop Runtime 				17.0.0.124 and earlier 	Windows and Macintosh 	3

AIR SDK 					17.0.0.124 and earlier 	Windows, Macintosh,	3 
									Android and iOS 

AIR SDK & Compiler 				17.0.0.124 and earlier 	Windows, Macintosh,	3 
									Android and iOS

AIR for Android 				17.0.0.124 and earlier 	Android 		3

These updates address critical vulnerabilities in the software.

Details

Adobe has released security updates for Adobe Flash Player for Windows, 
Macintosh and Linux. These updates address vulnerabilities that could 
potentially allow an attacker to take control of the affected system. Adobe 
recommends users update their product installations to the latest versions:

Users of the Adobe Flash Player desktop runtime for Windows and Macintosh 
should update to Adobe Flash Player 17.0.0.134.

Users of the Adobe Flash Player Extended Support Release should update to 
Adobe Flash Player 13.0.0.277.

Users of Adobe Flash Player for Linux should update to Adobe Flash Player 
11.2.202.451.

Adobe Flash Player installed with Google Chrome, as well as Internet Explorer
on Windows 8.x, will automatically update to version 17.0.0.134.

Users of the Adobe AIR desktop runtime should update to version 17.0.0.144.

Users of the Adobe AIR SDK and AIR SDK and Compiler should update to version 
17.0.0.144.

Users of Adobe AIR for Android should update to version 17.0.0.144.

These updates resolve memory corruption vulnerabilities that could lead to 
code execution (CVE-2015-0332, CVE-2015-0333, CVE-2015-0335, CVE-2015-0339).

These updates resolve type confusion vulnerabilities that could lead to code 
execution (CVE-2015-0334, CVE-2015-0336).

These updates resolve a vulnerability that could lead to a cross-domain policy
bypass (CVE-2015-0337).

These updates resolve a vulnerability that could lead to a file upload 
restriction bypass (CVE-2015-0340).

These updates resolve an integer overflow vulnerability that could lead to 
code execution (CVE-2015-0338).

These updates resolve use-after-free vulnerabilities that could lead to code 
execution (CVE-2015-0341, CVE-2015-0342).

Affected Software 			Recommended Player Update 	Availability

Flash Player Desktop Runtime 		17.0.0.134			Flash Player Download Center
									Flash Player Distribution

Flash Player Extended Support Release 	13.0.0.277 			Extended Support

Flash Player for Linux 			11.2.202.451 			Flash Player Download Center

Flash Player for Google Chrome 		17.0.0.134 			Google Chrome Releases

Flash Player for Internet Explorer 10 	11 17.0.0.134 			Microsoft Security Advisory
and Internet Explorer 

AIR desktop runtime 			17.0.0.144 			AIR Download Center

AIR SDK 				17.0.0.144 			AIR SDK Download

AIR SDK & Compiler 			17.0.0.144 			AIR SDK Download

AIR for Android 			17.0.0.144 			Google Play

Acknowledgments

Adobe would like to thank the following individuals and organizations for 
reporting the relevant issues and for working with Adobe to help protect our 
customers:

Chris Evans of Google Project Zero (CVE-2015-0332, CVE-2015-0335)

Yuki Chen as well as Xiaoning Li of Intel Labs and Haifei Li of McAfee Labs 
(CVE-2015-0333)

Natalie Silvanovich, working with Google Project Zero (CVE-2015-0334, 
CVE-2015-0336)

Soroush Dalili of NCC Group (CVE-2015-0337, CVE-2015-0340)

Mark Brand of Google Project Zero (CVE-2015-0339)

bilou working with HP's Zero Day Initiative (CVE-2015-0341)

Jihui Lu of KeenTeam (@K33nTeam), working with the Chromium vulnerability 
reward program (CVE-2015-0342)

Revisions

April 15, 2015: Added versions of Adobe AIR that address the CVEs referenced 
in this bulletin.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=bjWb
-----END PGP SIGNATURE-----