-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0020
       Update for Vulnerabilities in Adobe Flash Player in Internet
                        Explorer and Microsoft Edge
                              5 January 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Internet Explorer 10
                   Microsoft Internet Explorer 11
                   Microsoft Edge
Publisher:         Microsoft
Operating System:  Windows 8
                   Windows Server 2012
                   Windows RT
                   Windows Server 2012 R2
                   Windows RT 8.1
                   Windows 10
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-8651 CVE-2015-8650 CVE-2015-8649
                   CVE-2015-8648 CVE-2015-8647 CVE-2015-8646
                   CVE-2015-8645 CVE-2015-8644 CVE-2015-8643
                   CVE-2015-8642 CVE-2015-8641 CVE-2015-8640
                   CVE-2015-8639 CVE-2015-8638 CVE-2015-8636
                   CVE-2015-8635 CVE-2015-8634 CVE-2015-8460
                   CVE-2015-8459  

Reference:         ESB-2016.0004
                   ESB-2012.0909

Original Bulletin: 
   https://technet.microsoft.com/library/security/2755801.aspx

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Advisory 2755801

Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and 
Microsoft Edge

Published: September 21, 2012 | Updated: December 29, 2015

Version: 52.0

Executive Summary

Microsoft is announcing the availability of an update for Adobe Flash Player 
in Internet Explorer on all supported editions of Windows 8, Windows Server 
2012, Windows RT, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and 
Windows 10; the update is also available for Adobe Flash Player in Microsoft 
Edge on all supported editions of Windows 10. The update addresses the 
vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash 
libraries contained within Internet Explorer 10, Internet Explorer 11, and 
Microsoft Edge.

Current Update

Microsoft recommends that customers apply the current update immediately using
update management software, or by checking for updates using the Microsoft 
Update service. Since the update is cumulative, only the current update will 
be offered. Customers do not need to install previous updates as a 
prerequisite for installing the current update.

On December 29, 2015, Microsoft released an update (3132372) for Internet 
Explorer 10 on Windows 8, Windows Server 2012, and Windows RT; Internet 
Explorer 11 on Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and 
Windows 10; and Microsoft Edge on Windows 10. The update addresses the 
vulnerabilities described in Adobe Security bulletin APSB16-01. For more 
information about this update, including download links, see Microsoft 
Knowledge Base Article 3132372.

Affected Software

Adobe Flash in Internet Explorer 10

Adobe Flash in Internet Explorer 11

Adobe Flash in Microsoft Edge

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=hlkg
-----END PGP SIGNATURE-----