ESB-2017.2329 - [Win] RoboHelp: Multiple vulnerabilities 2017-09-14

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2329
             APSB17-25 Security updates available for RoboHelp
                             14 September 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           RoboHelp
Publisher:         Adobe
Operating System:  Windows
Impact/Access:     Cross-site Scripting           -- Remote with User Interaction
                   Provide Misleading Information -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-3105 CVE-2017-3104 

Original Bulletin: 
   https://helpx.adobe.com/security/products/robohelp/apsb17-25.html

- --------------------------BEGIN INCLUDED TEXT--------------------

APSB17-25 Security updates available for RoboHelp

Security update available for RoboHelp | APSB17-25

Bulletin ID Date Published Priority

APSB17-25 September 12, 2017 3

Summary

Adobe has released a security update for RoboHelp for Windows. This update 
resolves an important input validation vulnerability that could be used in a 
cross-site scripting attack (CVE-2017-3104), as well as an unvalidated URL 
redirect vulnerability rated moderate that could be used in phishing campaigns
(CVE-2017-3105).

Affected product versions

Product Version Platform

RoboHelp RH2017.0.1 and earlier versions Windows

RoboHelp RH12.0.4.460 and earlier versions Windows

Solution

Adobe categorizes these updates with the following priority ratings and 
recommends users update their installation to the newest version:

Product Version Platform Priority Availability

RoboHelp RH2017.0.2

Windows 3

Download

RoboHelp RH12.0.4.460 (Hotfix)

Windows 3 Technical Note

Note:

Refer to the Release notes for instructions to download and apply the update.

Refer to the Knowledge Base article for instructions to download and apply the
fix on RoboHelp 2015.

Vulnerability details

Vulnerability Category Vulnerability Impact Severity CVE Numbers

Improper Neutralization of Input During Web Page Generation DOM-based 
cross-site scripting attack Important CVE-2017-3104

Improper Neutralization of Input During Web Page Generation Open Redirect 
attack Moderate CVE-2017-3105

Acknowledgments

Adobe would like to thank Reynold Regan of CNSI - Center for Technology & 
Innovation, Chennai for reporting both issues and for working with Adobe to 
help protect our customers.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=xJZ+
-----END PGP SIGNATURE-----

« Back to bulletins