exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2008-100A

Technical Cyber Security Alert 2008-100A
Posted Apr 10, 2008
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA08-100A - Adobe has released Security advisory APSB08-11 to address multiple vulnerabilities affecting Adobe Flash. The most severe of these vulnerabilities could allow a remote attacker to execute arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
SHA-256 | 37e122fa2bc583269280d2f329271ca300ef47133ecf03bad3fa6eecbab10cb8

Technical Cyber Security Alert 2008-100A

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA08-100A


Adobe Flash Updates for Multiple Vulnerabilities

Original release date: April 9, 2008
Last revised: --
Source: US-CERT

Systems Affected

* Adobe Flash Player 9.0.115.0 and earlier
* Adobe Flash Player 8.0.39.0 and earlier

Overview

Adobe has released Security advisory APSB08-11 to address multiple
vulnerabilities affecting Adobe Flash. The most severe of these
vulnerabilities could allow a remote attacker to execute arbitrary
code.

I. Description

Adobe Security Advisory APSB08-011 addresses a number of
vulnerabilities affecting the Adobe Flash player. Flash player
versions 9.0.115.0 and earlier and 8.0.39.0 and earlier are affected.
Further details are available in the US-CERT Vulnerability Notes
Database.

An attacker could exploit these vulnerabilities by convincing a user
to visit a website that hosts a specially crafted SWF file. The Adobe
Flash browser plugin is available for multiple web browsers and
operating systems, any of which could be affected.

II. Impact

The impacts of these vulnerabilities vary. The most severe of these
vulnerabilities allows a remote attacker to execute arbitrary code or
conduct cross-site scripting attacks.

III. Solution

Apply Updates

Check with your operating system vendor for patches or updates. If you
get the flash player from Adobe, see the Adobe Get Flash page for
information about updates.

Restrict access

These vulnerabilities can be mitigated by disabling the Flash plugin
or by using the NoScript extension to whitelist websites that can
access the Flash plugin. For more information about securely
configuring web browsers, please see the Securing Your Web Browser
document.

IV. References

* Adobe Security Advisory APSB08-011 -
<https://www.adobe.com/support/security/bulletins/apsb08-11.html>

* Adobe Flash Player Download Center -
<https://www.adobe.com/go/getflash>

* Understanding Flash Player 9 April 2008 Security Update
compatibility -
<https://www.adobe.com/devnet/flashplayer/articles/flash_player9_security_update.html>

* US-CERT Vulnerability Notes for Adobe Security advisory APSB08-011 -
<https://www.kb.cert.org/vuls/byid?searchview&query=APSB08-011>

* Securing Your Web Browser -
<https://www.us-cert.gov/reading_room/securing_browser/>

_________________________________________________________________

The most recent version of this document can be found at:

<https://www.us-cert.gov/cas/techalerts/TA08-100A.html>
_________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA08-100A Feedback VU#347812" in the
subject.
_________________________________________________________________

For instructions on subscribing to or unsubscribing from this
mailing list, visit <https://www.us-cert.gov/cas/signup.html>.
_________________________________________________________________

Produced 2008 by US-CERT, a government organization.

Terms of use:

<https://www.us-cert.gov/legal.html>
____________________________________________________________________

Revision History

April 9, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBR/zdXPRFkHkM87XOAQIR+ggAk0+t7keRs7OzyAsdG12UtFjyxheeX9Xi
Zl5UNxlnrUIAxe4eO0ySC+7TQm1MaJrBW2yWN7nbtf0pMGRfSudG78kv2KdVqT4o
SIrFhxIW+a4g2bFh56TEhZGRitMI+Yg3P0YyDA//svYvAQTXoEnBM0I4TBEYkb5C
d2X5O6cEJHpdz6yTlox0lnQb5fkpVsqGqnzagWtBAufEA482e1LeRiz/ehSs/SRa
iSbkadW30ZStsrRIrF1E7QRS1BF1QZ96C/5pgxl44zBb4d4+Dhjkk21S0hUjI/hm
FFKom4BrBaON+dRpsAWTDwxhM0Dib3YfskvKrdNic+lQ5ow/Mnp0Pg==
=SC0g
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close