U radu programskog paketa Flash Player otkriveno je više nedostataka koje napadač može iskoristiti za zaobilaženje postavljenih ograničenja, proizvoljno izvršavanje programskog koda, napad uskraćivanjem usluga te XSS napad.
Uočeno je da se javljaju greške prilikom pokretanja zloćudnih MP4 datoteka te XSS (eng. Cross-site scripting) ranjivost. Uočeno je i nekoliko nepravilnosti nepoznatog uzroka.
Posljedica:
Zlonamjeran napadač može iskoristiti navedene propuste za zaobilaženje postavljenih ograničenja, pokretanje proizvoljnog programskog koda, napad uskraćivanjem usluga (eng. Denial of Service) i XSS napad.
Rješenje:
Svim korisnicima se savjetuje korištenje dostupnih rješenja koja otklanjaju ranjivosti.
SUSE Security Update: Security update for flash-player
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0280-1
Rating: critical
References: #747297
Cross-References: CVE-2012-0751 CVE-2012-0752 CVE-2012-0753
CVE-2012-0754 CVE-2012-0755 CVE-2012-0756
CVE-2012-0767
Affected Products:
SUSE Linux Enterprise Desktop 11 SP1 FOR SP2
SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available. It
includes one version update.
Description:
flash-player was updated to version 11.1.102.62.
It fixes lots of security issues, some already exploited in
the wild.
Details can be found at:
https://www.adobe.com/support/security/bulletins/apsb12-03.h
tml
<https://www.adobe.com/support/security/bulletins/apsb12-03.
html>
These vulnerabilities could cause a crash and potentially
allow an attacker to take control of the affected system.
This update also resolves a universal cross-site scripting
vulnerability that could be used to take actions on a
user's behalf on any website or webmail provider, if the
user visits a malicious website. There are reports that
this vulnerability (CVE-2012-0767) is being exploited in
the wild in active targeted attacks designed to trick the
user into clicking on a malicious link delivered in an
email message (Internet Explorer on Windows only).
Security Issue references:
* CVE-2012-0751
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0751
>
* CVE-2012-0752
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0752
>
* CVE-2012-0753
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0753
>
* CVE-2012-0754
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0754
>
* CVE-2012-0755
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0755
>
* CVE-2012-0756
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0756
>
* CVE-2012-0767
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0767
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP1 FOR SP2:
zypper in -t patch sledsp1fsp2-flash-player-5817
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-flash-player-5817
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP1 FOR SP2 (i586 x86_64) [New Version:
11.1.102.62]:
flash-player-11.1.102.62-0.14.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version:
11.1.102.62]:
flash-player-11.1.102.62-0.14.1
References:
http://support.novell.com/security/cve/CVE-2012-0751.html
http://support.novell.com/security/cve/CVE-2012-0752.html
http://support.novell.com/security/cve/CVE-2012-0753.html
http://support.novell.com/security/cve/CVE-2012-0754.html
http://support.novell.com/security/cve/CVE-2012-0755.html
http://support.novell.com/security/cve/CVE-2012-0756.html
http://support.novell.com/security/cve/CVE-2012-0767.html
https://bugzilla.novell.com/747297
http://download.novell.com/patch/finder/?keywords=e7839de3d618cfe53b47ab455a9b2171
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke