Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:25668
HistoryFeb 11, 2011 - 12:00 a.m.

Security update available for Adobe Flash Player

2011-02-1100:00:00
vulners.com
28

Security update available for Adobe Flash Player

Release date: February 8, 2011

Vulnerability identifier: APSB11-02

CVE Numbers: CVE-2011-0558, CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0575, CVE-2011-0577, CVE-2011-0578, CVE-2011-0607, CVE-2011-0608

Platform: All Platforms
Summary

Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

Adobe recommends users of Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris update to Adobe Flash Player 10.2.152.26.
Affected software versions

Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris

To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Solution

Adobe recommends all users of Adobe Flash Player 10.1.102.64 and earlier versions upgrade to the newest version 10.2.152.26 by downloading it from the Adobe Flash Player Download Center. Windows users can install the update via the auto-update mechanism within the product when prompted.
Severity rating

Adobe categorizes this as a critical update and recommends affected users update their installation to the newest version.
Details

Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

This update resolves an integer overflow vulnerability that could lead to code execution (CVE-2011-0558).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0559).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0560, CVE-2011-0561).

This update resolves multiple memory corruption vulnerabilities that could lead to code execution (CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574).

This update resolves a library-loading vulnerability that could lead to code execution (CVE-2011-0575).

This update resolves a font-parsing vulnerability that could lead to code execution (CVE-2011-0577).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0578).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0607).

This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0608).

Adobe recommends users of Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris update to Adobe Flash Player 10.2.152.26.

Affected software

Recommended player update

Availability

Flash Player 10.1.102.64 and earlier

10.2.152.26

Flash Player Download Center

Flash Player 10.1.102.64 and earlier - network distribution

10.2.152.26

Flash Player Licensing

Flash Professional CS5, Flash CS4 Professional and Flex 4

10.2.152.26

Flash Player Support Center

Acknowledgements

Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:

* Vitaliy Toropov through iDefense's Vulnerability Contributor Program (CVE-2011-0558)
* An Anonymous Researcher reported through iDefense's Vulnerability Contributor Program (CVE-2011-0559)
* Will Dormann of CERT (CVE-2011-0560, CVE-2011-0561)
* Bo Qu of Palo Alto Networks (CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574)
* Simon Raner of ACROS Security (CVE-2011-0575)
* Marc Schoenefeld of Red Hat Security Response Team (CVE-2011-0577)
* An anonymous reporter through TippingPoint's Zero Day Initiative (CVE-2011-0578)
* Tavis Ormandy of the Google Security Team (CVE-2011-0607, CVE-2011-0608)