Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2008.0006 -- [Win][UNIX/Linux] Flash Player update available to address security vulnerabilities 4 January 2008 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Adobe Flash Player 9.0.48.0 and earlier Adobe Flash Player 8.0.35.0 and earlier Adobe Flash Player 7.0.70.0 and earlier Publisher: Adobe Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact: Execute Arbitrary Code/Commands Increased Privileges Cross-site Scripting Cross-site Request Forgery Provide Misleading Information Access: Remote/Unauthenticated CVE Names: CVE-2007-6246 CVE-2007-6245 CVE-2007-6244 CVE-2007-6243 CVE-2007-6242 CVE-2007-5476 CVE-2007-5275 CVE-2007-4768 CVE-2007-4324 Original Bulletin: http://www.adobe.com/support/security/bulletins/apsb07-20.html - --------------------------BEGIN INCLUDED TEXT-------------------- Adobe Security Advisory APSB07-20 Flash Player update available to address security vulnerabilities Release date: December 18, 2007 Vulnerability identifier: APSB07-20 CVE number: CVE-2007-6242, CVE-2007-4768, CVE-2007-5275, CVE-2007-6243, CVE-2007-6244, CVE-2007-6245, CVE-2007-4324, CVE-2007-6246, CVE-2007-5476 Platform: All platforms Affected software versions: Adobe Flash Player 9.0.48.0 and earlier, 8.0.35.0 and earlier, and 7.0.70.0 and earlier. Summary - --------------------------------------------------------------------------- Critical vulnerabilities have been identified in Adobe Flash Player that could allow an attacker who successfully exploits these potential vulnerabilities to take control of the affected system. A malicious SWF must be loaded in Flash Player by the user for an attacker to exploit these potential vulnerabilities. Users are recommended to update to the most current version of Flash Player available for their platform. Affected software versions - --------------------------------------------------------------------------- Adobe Flash Player 9.0.48.0 and earlier, 8.0.35.0 and earlier, and 7.0.70.0 and earlier. To verify the Adobe Flash Player version number, access the About Flash Player page, or right-click on Flash content and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system. Solution - --------------------------------------------------------------------------- Adobe recommends all users of Adobe Flash Player 9.0.48.0 and earlier versions upgrade to the newest version 9.0.115.0 (Win, Mac, Linux), by downloading it from the Player Download Center, or by using the auto-update mechanism within the product when prompted. Adobe will be providing an update to Adobe Flash Player 9.0.47.0 for Solaris at a later date. Customers can download and install the Flash Player public beta, which addresses these vulnerabilities, from the Adobe Labs site in the meantime. For customers who cannot upgrade to Adobe Flash Player 9, Adobe has developed a patched version of Flash Player 7. Please refer to the Flash Player update TechNote. Severity rating - ---------------------------------------------------------------------------- Adobe categorizes this as a critical update and recommends affected users upgrade to version 9.0.115.0 (Win, Mac, Linux). Details - ---------------------------------------------------------------------------- Multiple input validation errors have been identified in Flash Player 9.0.48.0 and earlier versions that could lead to the potential execution of arbitrary code. These vulnerabilities could be accessed through content delivered from a remote location via the users web browser, email client, or other applications that include or reference the Flash Player. (CVE-2007-4768, CVE-2007-6242) This update introduces functionality to mitigate a potential issue could potentially aid an attacker in executing a DNS rebinding attack. For more information, see the following Adobe Developer Center article. (CVE-2007-5275) This update introduces a new, stricter method for Flash Player to interpret cross-domain policy files. These changes could help prevent privilege escalation attacks against web servers hosting Flash content and cross-domain policy files. For more information, see the following Adobe Developer Center article. (CVE-2007-6243) This update restricts the unsupported asfunction: protocol to address potential cross-site scripting issues with some SWF files. This issue is specific to Flash Player 8 and Flash Player 9 and does not affect Flash Player 7. (CVE-2007-6244) This update makes changes to the navigateToURL function to prevent potential Universal Cross-Site Scripting attacks. This issue is specific to the Flash Player ActiveX Control and the Internet Explorer Browser. (CVE-2007-6244) This update resolves an issue that could allow remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks. (CVE-2007-6245) This update introduces functionality to mitigate a potential port-scanning issue. For more information, see the following Knowledgebase Article. (CVE-2007-4324) The Linux update for Flash Player addresses a memory permissions issue that could lead to privilege escalation. (CVE-2007-6246) The Mac update for Flash Player addresses the issue with Flash Player originally reported by Opera and described in Security Advisory APSA07-05. (CVE-2007-5476) Important Notice regarding Flash Player 7 Support - ----------------------------------------------------------------------------- With this security bulletin, Adobe is retiring support of Adobe Flash Player 7 and will no longer provide security updates for Flash Player 7 after this release. Adobes support policy for Adobe Flash Player is to support the current and previous major release. Flash Player 7 was previously updated with security fixes as a courtesy to customers on Microsoft Windows 95, Microsoft Windows /NT and Macintosh Classic operating systems, which were longer supported with the Flash Player 8 release in September 2005, and to Linux and Solaris customers prior to the availability of Flash Player 9. Users who wish to continue to use Adobe Flash Player 7, can find archived installers in the Archived Flash Player Technote (http://www.adobe.com/go/tn_14266). Acknowledgments - ----------------------------------------------------------------------------- Adobe would like to thank Tavis Ormandy and Will Drewry of the Google Security Team for reporting input validation errors and for working with us to help protect our mutual customers security. (CVE-2007-4768) Adobe would like to thank Aaron Portnoy of TippingPoint DVLabs for reporting an input validation error and for working with us to help protect our mutual customers security. (CVE-2007-6242) Adobe would like to thank Dan Boneh, Adam Barth, Andrew Bortz, Collin Jackson, and Weidong Shao of Stanford University for reporting the DNS rebinding issue and for working with us to help protect our customers security. (CVE-2007-5275) Adobe would like to thank Toshiharu Sugiyama of UBsecure, Inc. and JPCERT/CC for reporting the cross-domain policy file issue and the HTTP header issue and for working with us to help protect our mutual customers security. (CVE-2007-6243, CVE-2007-6245) Adobe would like to thank Rich Cannings of the Google Security Team for reporting the asfunction: issue and for working with us to help protect our mutual customers security. (CVE-2007-6244) Adobe would like to thank Collin Jackson and Adam Barth of Stanford University for reporting the navigateToURL issue and for working with us to help protect our customers security. (CVE-2007-6244) Adobe would like to thank Jesse Michael and Thomas Biege of SUSE for reporting the privilege escalation issues with the Linux version of Flash Player and for working with us to help protect our customers' security. (CVE-2007-6246) Adobe would like to thank Opera for reporting the issue with the Mac version of Flash Player and for working with us to help protect our mutual customers' security. (CVE-2007-5476) Adobe disclaimer - ----------------------------------------------------------------------------- License agreement By using software of Adobe Systems Incorporated or its subsidiaries ("Adobe"); you agree to the following terms and conditions. If you do not agree with such terms and conditions; do not use the software. The terms of an end user license agreement accompanying a particular software file upon installation or download of the software shall supersede the terms presented below. The export and re-export of Adobe software products are controlled by the United States Export Administration Regulations and such software may not be exported or re-exported to Cuba; Iran; Iraq; Libya; North Korea; Sudan; or Syria or any country to which the United States embargoes goods. In addition; Adobe software may not be distributed to persons on the Table of Denial Orders; the Entity List; or the List of Specially Designated Nationals. By downloading or using an Adobe software product you are certifying that you are not a national of Cuba; Iran; Iraq; Libya; North Korea; Sudan; or Syria or any country to which the United States embargoes goods and that you are not a person on the Table of Denial Orders; the Entity List; or the List of Specially Designated Nationals. If the software is designed for use with an application software product (the "Host Application") published by Adobe; Adobe grants you a non-exclusive license to use such software with the Host Application only; provided you possess a valid license from Adobe for the Host Application. Except as set forth below; such software is licensed to you subject to the terms and conditions of the End User License Agreement from Adobe governing your use of the Host Application. DISCLAIMER OF WARRANTIES: YOU AGREE THAT ADOBE HAS MADE NO EXPRESS WARRANTIES TO YOU REGARDING THE SOFTWARE AND THAT THE SOFTWARE IS BEING PROVIDED TO YOU "AS IS" WITHOUT WARRANTY OF ANY KIND. ADOBE DISCLAIMS ALL WARRANTIES WITH REGARD TO THE SOFTWARE; EXPRESS OR IMPLIED; INCLUDING; WITHOUT LIMITATION; ANY IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE; MERCHANTABILITY; MERCHANTABLE QUALITY OR NONINFRINGEMENT OF THIRD PARTY RIGHTS. Some states or jurisdictions do not allow the exclusion of implied warranties; so the above limitations may not apply to you. LIMIT OF LIABILITY: IN NO EVENT WILL ADOBE BE LIABLE TO YOU FOR ANY LOSS OF USE; INTERRUPTION OF BUSINESS; OR ANY DIRECT; INDIRECT; SPECIAL; INCIDENTAL; OR CONSEQUENTIAL DAMAGES OF ANY KIND (INCLUDING LOST PROFITS) REGARDLESS OF THE FORM OF ACTION WHETHER IN CONTRACT; TORT (INCLUDING NEGLIGENCE); STRICT PRODUCT LIABILITY OR OTHERWISE; EVEN IF ADOBE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Some states or jurisdictions do not allow the exclusion or limitation of incidental or consequential damages; so the above limitation or exclusion may not apply to you. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBR322sCh9+71yA2DNAQLywAQAnVbtrB5vms+qkm7bCU6zxdn0ZO/GpzT9 ndCOD5S9Le1SMAPYCFx/FC4r4L+jnODxwNVZU0ecYawNL570s/ZO2qklPlf7s7bc 9+D25eda2dqOxXVfe4um0Fjx8cJmU0MV8UnWHPwn7+b89pcVCCzViSA11FW11BR1 NnjXFkwwy4o= =nPJz -----END PGP SIGNATURE-----