RedHat: Important: flash-plugin security update RHSA-2008:0945-01
Summary
The flash-plugin package contains a Firefox-compatible Adobe Flash Player
Web browser plug-in.
A flaw was found in the way Adobe Flash Player wrote content to the
clipboard. A malicious SWF file could populate the clipboard with a URL
that could cause the user to mistakenly load an attacker-controlled URL.
(CVE-2008-3873)
A flaw was found which allowed Adobe Flash Player's ActionScript to
initiate file uploads and downloads without user interaction.
FileReference.browse and FileReference.download calls can now only be
initiated via user interaction, such as mouse-clicks or key-presses on the
keyboard. (CVE-2008-4401)
A flaw was found in Adobe Flash Player's display of the Settings Manager
content. A malicious SWF file could trick the user into unknowingly
clicking a link or dialog. This could then give the malicious SWF file
permission to access the local machine's camera or microphone.
(CVE-2008-4503)
Flaws were found in the way Flash Player restricted the interpretation and
usage of cross-domain policy files. A remote attacker could use Flash
Player to conduct cross-domain and cross-site scripting attacks
(CVE-2007-4324, CVE-2007-6243). This update provides enhanced fixes for
these issues.
Adobe Flash Player 10 also includes bug fixes and feature enhancements
including:
* improved stability on the Linux platform by fixing a race condition issue
in sound output.
* new support for custom filters and effects, native 3D transformation and
animation, advanced audio processing, a new, more flexible text engine, and
GPU hardware acceleration.
For more information on new features and enhancements, see the Adobe Flash
Player site and the Adobe Labs Release Notes.
Note: some users may have installed a 3rd-party component, libflashsupport,
for older versions of Flash Player. Adobe Flash Player 10 no longer
supports libflashsupport. Users are advised to remove libflashsupport if
they have it installed.
All users of Adobe Flash Player should upgrade to this updated package,
which contains Flash Player version 10.0.12.36.
Summary
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4324 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3873 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4401 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4503 http://adobe.com/products/flashplayer http://www.redhat.com/security/updates/classification/#important
Package List
RHEL Desktop Supplementary (v. 5 client):
i386:
flash-plugin-10.0.12.36-2.el5.i386.rpm
x86_64:
flash-plugin-10.0.12.36-2.el5.i386.rpm
RHEL Supplementary (v. 5 server):
i386:
flash-plugin-10.0.12.36-2.el5.i386.rpm
x86_64:
flash-plugin-10.0.12.36-2.el5.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
Topic
An updated Adobe Flash Player package that fixes several security issues is now available for Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having important security impact by the Red Hat Security Response Team.
Topic
Relevant Releases Architectures
RHEL Desktop Supplementary (v. 5 client) - i386, x86_64
RHEL Supplementary (v. 5 server) - i386, x86_64
Bugs Fixed
252292 - CVE-2007-4324 Flash movie can determine whether a TCP port is open
440664 - CVE-2007-6243 Flash Player cross-domain and cross-site scripting flaws
465736 - CVE-2008-3873 flash: clipboard hijack attack
466154 - CVE-2008-4401 flash-plugin: upload/download user interaction
466344 - CVE-2008-4503 Adobe Flash Player clickjacking