-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1534
                  Security update available for Adobe AIR
                               17 June 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Adobe AIR
Publisher:         Adobe
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-4126  

Original Bulletin: 
   https://helpx.adobe.com/security/products/air/apsb16-23.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Adobe Security Bulletin

Security update available for Adobe AIR

Release date: June 16, 2016

Vulnerability identifier: APSB16-23

Priority: 3

CVE number: CVE-2016-4126

Platform: Windows

Summary

Adobe has released a security update for Adobe AIR for Windows. This update 
addresses a vulnerability in the directory search path used by the AIR 
installer that could potentially allow an attacker to take control of the 
affected system.

Affected Versions

Product 			Affected Versions 	Platform

Adobe AIR Desktop Runtime 	21.0.0.215 and earlier 	Windows

To verify the version of Adobe AIR installed on your system, follow the 
instructions in the Adobe AIR TechNote.

Solution

Adobe categorizes this update with the following priority rating and 
recommends users update their installation to the newest version:

Product 		Updated Versions 	Platform	Priority rating Availability

AIR Desktop Runtime 	22.0.0.153 		Windows 	3 		AIR Download Center

Adobe recommends users of the AIR desktop runtime, AIR SDK and AIR SDK & 
Compiler update to version 22.0.0.153 by visiting the AIR download center or 
the AIR developer center.

Vulnerability Details

This update resolves a vulnerability in the directory search path used by the
Air installer that could lead to code execution (CVE-2016-4126).

Acknowledgments

Adobe would like to thank Alec Blance for reporting this issue and for working
with Adobe to help protect our customers.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=4EFi
-----END PGP SIGNATURE-----