-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ==================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2009:1188-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1188.html Issue date: 2009-07-31 CVE Names: CVE-2009-1862 CVE-2009-1863 CVE-2009-1864 CVE-2009-1865 CVE-2009-1866 CVE-2009-1867 CVE-2009-1868 CVE-2009-1869 CVE-2009-1870 ==================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 Supplementary. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Supplementary (v. 5 client) - i386, x86_64 RHEL Supplementary (v. 5 server) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. Multiple security flaws were found in the way Flash Player displayed certain SWF content. An attacker could use these flaws to create a specially-crafted SWF file that would cause flash-plugin to crash or, possibly, execute arbitrary code when the victim loaded a page containing the specially-crafted SWF content. (CVE-2009-1862, CVE-2009-1863, CVE-2009-1864, CVE-2009-1865, CVE-2009-1866, CVE-2009-1868, CVE-2009-1869) A clickjacking flaw was discovered in Flash Player. A specially-crafted SWF file could trick a user into unintentionally or mistakenly clicking a link or a dialog. (CVE-2009-1867) A flaw was found in the Flash Player local sandbox. A specially-crafted SWF file could cause information disclosure when it was saved to the hard drive. (CVE-2009-1870) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.0.32.18. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at 5. Bugs fixed (https://bugzilla.redhat.com/): 513362 - CVE-2009-1862 acroread, flash-plugin: Remote code execution vulnerability via malicious SWF (Shockwave Flash) content 514874 - flash-plugin: multiple code execution flaws (APSB09-10) 514877 - flash-plugin: multiple information disclosure flaws (APSB09-10) 6. Package List: RHEL Desktop Supplementary (v. 5 client): i386: flash-plugin-10.0.32.18-2.el5.i386.rpm x86_64: flash-plugin-10.0.32.18-2.el5.i386.rpm RHEL Supplementary (v. 5 server): i386: flash-plugin-10.0.32.18-2.el5.i386.rpm x86_64: flash-plugin-10.0.32.18-2.el5.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1862 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1863 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1864 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1865 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1866 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1867 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1868 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1869 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1870 https://www.redhat.com/security/updates/classification/#critical https://www.adobe.com/support/security/bulletins/apsb09-10.html 8. Contact: The Red Hat security contact is. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKcv4OXlSAg2UNWIIRAuFaAKDCqgHA1X6OefSZeF9nmGxvzCgf8ACgjVi0 xpZtMOkfkm+AiPdFr9DWxRM=5ej0 -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list