-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                    ESB-2008.0006 -- [Win][UNIX/Linux]
     Flash Player update available to address security vulnerabilities
                              4 January 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Adobe Flash Player 9.0.48.0 and earlier
                      Adobe Flash Player 8.0.35.0 and earlier
                      Adobe Flash Player 7.0.70.0 and earlier
Publisher:            Adobe
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact:               Execute Arbitrary Code/Commands
                      Increased Privileges
                      Cross-site Scripting
                      Cross-site Request Forgery
                      Provide Misleading Information
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-6246 CVE-2007-6245 CVE-2007-6244
                      CVE-2007-6243 CVE-2007-6242 CVE-2007-5476
                      CVE-2007-5275 CVE-2007-4768 CVE-2007-4324

Original Bulletin:
  http://www.adobe.com/support/security/bulletins/apsb07-20.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Adobe Security Advisory APSB07-20
Flash Player update available to address security vulnerabilities

Release date: December 18, 2007

Vulnerability identifier: APSB07-20

CVE number: CVE-2007-6242, CVE-2007-4768, CVE-2007-5275, CVE-2007-6243,
            CVE-2007-6244, CVE-2007-6245, CVE-2007-4324, CVE-2007-6246,
            CVE-2007-5476

Platform: All platforms

Affected software versions: Adobe Flash Player 9.0.48.0 and earlier,
                            8.0.35.0 and earlier, and 7.0.70.0 and earlier.
Summary
- ---------------------------------------------------------------------------
Critical vulnerabilities have been identified in Adobe Flash Player that
could allow an attacker who successfully exploits these potential
vulnerabilities to take control of the affected system. A malicious SWF
must be loaded in Flash Player by the user for an attacker to exploit
these potential vulnerabilities. Users are recommended to update to the
most current version of Flash Player available for their platform.

Affected software versions
- ---------------------------------------------------------------------------
Adobe Flash Player 9.0.48.0 and earlier, 8.0.35.0 and earlier,
and 7.0.70.0 and earlier.

To verify the Adobe Flash Player version number, access the About Flash
Player page, or right-click on Flash content and select "About Adobe
(or Macromedia) Flash Player" from the menu. If you use multiple browsers,
perform the check for each browser you have installed on your system.

Solution
- ---------------------------------------------------------------------------
Adobe recommends all users of Adobe Flash Player 9.0.48.0 and earlier
versions upgrade to the newest version 9.0.115.0 (Win, Mac, Linux), by
downloading it from the Player Download Center, or by using the auto-update
mechanism within the product when prompted.

Adobe will be providing an update to Adobe Flash Player 9.0.47.0 for
Solaris at a later date. Customers can download and install the Flash Player
public beta, which addresses these vulnerabilities, from the Adobe Labs site
in the meantime.

For customers who cannot upgrade to Adobe Flash Player 9, Adobe has
developed a patched version of Flash Player 7. Please refer to the Flash
Player update TechNote.

Severity rating
- ----------------------------------------------------------------------------
Adobe categorizes this as a critical update and recommends affected users
upgrade to version 9.0.115.0 (Win, Mac, Linux).

Details
- ----------------------------------------------------------------------------
Multiple input validation errors have been identified in Flash Player
9.0.48.0 and earlier versions that could lead to the potential execution of
arbitrary code. These vulnerabilities could be accessed through content
delivered from a remote location via the users web browser, email client,
or other applications that include or reference the Flash Player.
(CVE-2007-4768, CVE-2007-6242)

This update introduces functionality to mitigate a potential issue could
potentially aid an attacker in executing a DNS rebinding attack. For more
information, see the following Adobe Developer Center article.
(CVE-2007-5275)

This update introduces a new, stricter method for Flash Player to
interpret cross-domain policy files. These changes could help prevent
privilege escalation attacks against web servers hosting Flash content
and cross-domain policy files. For more information, see the following
Adobe Developer Center article. (CVE-2007-6243)

This update restricts the unsupported asfunction: protocol to address
potential cross-site scripting issues with some SWF files. This issue is
specific to Flash Player 8 and Flash Player 9 and does not affect Flash
Player 7. (CVE-2007-6244)

This update makes changes to the navigateToURL function to prevent
potential Universal Cross-Site Scripting attacks. This issue is specific
to the Flash Player ActiveX Control and the Internet Explorer Browser.
(CVE-2007-6244)

This update resolves an issue that could allow remote attackers to
modify HTTP headers of client requests and conduct HTTP Request
Splitting attacks. (CVE-2007-6245)

This update introduces functionality to mitigate a potential port-scanning
issue. For more information, see the following Knowledgebase Article.
(CVE-2007-4324)

The Linux update for Flash Player addresses a memory permissions issue
that could lead to privilege escalation. (CVE-2007-6246)

The Mac update for Flash Player addresses the issue with Flash Player
originally reported by Opera and described in Security Advisory APSA07-05.
(CVE-2007-5476)

Important Notice regarding Flash Player 7 Support
- -----------------------------------------------------------------------------
With this security bulletin, Adobe is retiring support of Adobe Flash
Player 7 and will no longer provide security updates for Flash Player 7
after this release. Adobes support policy for Adobe Flash Player is to
support the current and previous major release. Flash Player 7 was
previously updated with security fixes as a courtesy to customers on
Microsoft Windows 95, Microsoft Windows /NT and Macintosh Classic operating
systems, which were longer supported with the Flash Player 8 release in
September 2005, and to Linux and Solaris customers prior to the
availability of Flash Player 9. Users who wish to continue to use Adobe
Flash Player 7, can find archived installers in the Archived Flash Player
Technote (http://www.adobe.com/go/tn_14266).

Acknowledgments
- -----------------------------------------------------------------------------
Adobe would like to thank Tavis Ormandy and Will Drewry of the Google
Security Team  for reporting input validation errors and for working with
us to help protect our mutual customers security. (CVE-2007-4768)

Adobe would like to thank Aaron Portnoy of TippingPoint DVLabs for
reporting an input validation error and for working with us to help protect
our mutual customers security. (CVE-2007-6242)

Adobe would like to thank Dan Boneh, Adam Barth, Andrew Bortz, Collin
Jackson, and Weidong Shao of Stanford University for reporting the DNS
rebinding issue and for working with us to help protect our customers
security. (CVE-2007-5275)

Adobe would like to thank Toshiharu Sugiyama of UBsecure, Inc. and
JPCERT/CC for reporting the cross-domain policy file issue and the HTTP
header issue and for working with us to help protect our mutual customers
security. (CVE-2007-6243, CVE-2007-6245)

Adobe would like to thank Rich Cannings of the Google Security Team for
reporting the asfunction: issue and for working with us to help protect
our mutual customers security. (CVE-2007-6244)

Adobe would like to thank Collin Jackson and Adam Barth of Stanford
University for reporting the navigateToURL issue and for working with
us to help protect our customers security. (CVE-2007-6244)

Adobe would like to thank Jesse Michael and Thomas Biege of SUSE for
reporting the privilege escalation issues with the Linux version of Flash
Player and for working with us to help protect our customers' security.
(CVE-2007-6246)

Adobe would like to thank Opera for reporting the issue with the Mac
version of Flash Player and for working with us to help protect our mutual
customers' security. (CVE-2007-5476)

Adobe disclaimer
- -----------------------------------------------------------------------------
License agreement

By using software of Adobe Systems Incorporated or its subsidiaries
("Adobe"); you agree to the following terms and conditions. If you do not
agree with such terms and conditions; do not use the software. The terms of
an end user license agreement accompanying a particular software file upon
installation or download of the software shall supersede the terms presented
below.

The export and re-export of Adobe software products are controlled by the
United States Export Administration Regulations and such software may not
be exported or re-exported to Cuba; Iran; Iraq; Libya; North Korea; Sudan;
or Syria or any country to which the United States embargoes goods. In
addition; Adobe software may not be distributed to persons on the Table of
Denial Orders; the Entity List; or the List of Specially Designated Nationals.

By downloading or using an Adobe software product you are certifying that
you are not a national of Cuba; Iran; Iraq; Libya; North Korea; Sudan; or
Syria or any country to which the United States embargoes goods and that you
are not a person on the Table of Denial Orders; the Entity List; or the List
of Specially Designated Nationals.

If the software is designed for use with an application software product
(the "Host Application") published by Adobe; Adobe grants you a non-exclusive
license to use such software with the Host Application only; provided you
possess a valid license from Adobe for the Host Application. Except as set
forth below; such software is licensed to you subject to the terms and
conditions of the End User License Agreement from Adobe governing your use of
the Host Application.

DISCLAIMER OF WARRANTIES: YOU AGREE THAT ADOBE HAS MADE NO EXPRESS
WARRANTIES TO YOU REGARDING THE SOFTWARE AND THAT THE SOFTWARE IS BEING
PROVIDED TO YOU "AS IS" WITHOUT WARRANTY OF ANY KIND. ADOBE DISCLAIMS ALL
WARRANTIES WITH REGARD TO THE SOFTWARE; EXPRESS OR IMPLIED; INCLUDING;
WITHOUT LIMITATION; ANY IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR
PURPOSE; MERCHANTABILITY; MERCHANTABLE QUALITY OR NONINFRINGEMENT OF THIRD
PARTY RIGHTS. Some states or jurisdictions do not allow the exclusion of
implied warranties; so the above limitations may not apply to you.

LIMIT OF LIABILITY: IN NO EVENT WILL ADOBE BE LIABLE TO YOU FOR ANY LOSS
OF USE; INTERRUPTION OF BUSINESS; OR ANY DIRECT; INDIRECT; SPECIAL;
INCIDENTAL; OR CONSEQUENTIAL DAMAGES OF ANY KIND (INCLUDING LOST PROFITS)
REGARDLESS OF THE FORM OF ACTION WHETHER IN CONTRACT; TORT (INCLUDING
NEGLIGENCE); STRICT PRODUCT LIABILITY OR OTHERWISE; EVEN IF ADOBE HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Some states or jurisdictions do
not allow the exclusion or limitation of incidental or consequential damages;
so the above limitation or exclusion may not apply to you.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR322sCh9+71yA2DNAQLywAQAnVbtrB5vms+qkm7bCU6zxdn0ZO/GpzT9
ndCOD5S9Le1SMAPYCFx/FC4r4L+jnODxwNVZU0ecYawNL570s/ZO2qklPlf7s7bc
9+D25eda2dqOxXVfe4um0Fjx8cJmU0MV8UnWHPwn7+b89pcVCCzViSA11FW11BR1
NnjXFkwwy4o=
=nPJz
-----END PGP SIGNATURE-----