Technical Cyber Security Alert 2010-162A - According to Adobe Security Bulletin APSB10-14, there are vulnerabilities in Adobe Flash and AIR. These vulnerabilities affect Flash Player, AIR, and possibly other products that support Flash. A remote attacker could exploit these vulnerabilities to execute arbitrary code.
7963dd151f6e5c13b6f329718ac565138bca7c9bccb72ba904089d59a8657579
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA10-162A
Adobe Flash and AIR Vulnerabilities
Original release date: June 11, 2010
Last revised: --
Source: US-CERT
Systems Affected
* Adobe Flash Player 10.0.45.2 and earlier 10.x versions
* Adobe Flash Player 9.0.262 and earlier 9.x versions
* Adobe AIR 1.5.3.9130 and earlier versions
Other Adobe products that support Flash may also be vulnerable.
Overview
According to Adobe Security Bulletin APSB10-14, there are
vulnerabilities in Adobe Flash and AIR. These vulnerabilities
affect Flash Player, AIR, and possibly other products that support
Flash. A remote attacker could exploit these vulnerabilities to
execute arbitrary code.
I. Description
Adobe Security Bulletin APSB10-14 describes vulnerabilities in
Adobe Flash that affects Flash Player and AIR. It may also affect
other products that independently support Flash, such as Adobe
Reader, Acrobat, Photoshop, Photoshop Lightroom, Freehand MX, and
Fireworks.
An attacker could exploit these vulnerabilities by convincing a
user to open specially crafted Flash content. Flash content is
commonly hosted on a web page, but it can also be embedded in a PDF
and other documents or provided as a stand-alone file.
One of these vulnerabilities, CVE-2010-1297, is being exploited
against Flash Player, Adobe Reader, and Acrobat. Additional
information about CVE-2010-1297 is available in US-CERT Technical
Cyber Security Alert TA10-159A and US-CERT Vulnerability Note
VU#486225.
II. Impact
If a user opens specially crafted Flash content, a remote attacker
may be able to execute arbitrary code.
III. Solution
Update Flash and AIR
Adobe Security Bulletin APSB10-14 recommends updating to Flash
Player 10.1.53.64 or 9.0.277.0 and AIR to 2.0.2.12610. This will
update the Flash web browser plug-in and ActiveX control and AIR,
but will not update Flash support in Adobe Reader, Acrobat, or
other products.
To reduce your exposure to these and other Flash vulnerabilities,
consider the following mitigation technique.
Disable Flash in your web browser
Uninstall Flash or restrict which sites are allowed to run Flash.
To the extent possible, only run trusted Flash content on trusted
domains. For more information, see Securing Your Web Browser.
IV. References
* Adobe Security Bulletin APSB10-14 -
<http://www.adobe.com/support/security/bulletins/apsb10-14.html>
* Technical Cyber Security Alert TA10-159A -
<http://www.us-cert.gov/cas/techalerts/TA10-159A.html>
* US-CERT Vulnerability Report VU#486225 -
<http://www.kb.cert.org/vuls/id/486225>
* Securing Your Web Browser -
<http://www.us-cert.gov/reading_room/securing_browser/>
* CVE-2010-1297 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297>
____________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA10-162A.html>
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA10-162A Feedback VU#486225" in
the subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2010 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
June 11, 2010: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBTBKnQj6pPKYJORa3AQIq+gf/emIaD07wO+6DwdTYMgpYQArprhO5bT+h
kgISYW+OW7Gt4Dq9BkoXgPzgahRRwQZnp0pgjzRst5PsC5+Vn4WCHR8OZBSEoSeo
eWL+Y8dqd/IYCPVWjocDbEoeKdDo02hIjRln3dIhvMYIJjO7hffL5OMhle1xW5aJ
y1dYQ4L5oT0OHWN4ZtLnvhMJoqEmpf2Pc2j92JrSNdnesgbGIYNgvcH43vHGQbPp
mA64SkfQCo80CeaSS6dPvnHfRhR8/lPWThoY6Mug4YcpO0Z9SZ7uQ1HftGdMkq67
E4kRZRpnpUGCglte3MVIg5gET3QV0Y8f2uDMv0fmEs38i91aRjJ0fA==
=v/JA
-----END PGP SIGNATURE-----