[SECURITY-L] US-CERT Technical Cyber Security Alert TA11-222A -- Adobe Updates for Multiple Vulnerabilities
CSIRT - UNICAMP
security em unicamp.br
Qui Ago 11 09:32:49 -03 2011
----- Forwarded message from US-CERT Technical Alerts <technical-alerts em us-cert.gov> -----
From: US-CERT Technical Alerts <technical-alerts em us-cert.gov>
Subject: US-CERT Technical Cyber Security Alert TA11-222A -- Adobe Updates for Multiple Vulnerabilities
To: technical-alerts em us-cert.gov
Date: Wed, 10 Aug 2011 17:24:11 -0400
Organization: US-CERT - +1 202-205-5266
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA11-222A
Adobe Updates for Multiple Vulnerabilities
Original release date: August 10, 2011
Last revised: --
Source: US-CERT
Systems Affected
* Shockwave Player 11.6.0.626 and earlier versions for Windows and Macintosh
* Flash Media Server 4.0.2 and earlier versions for Windows and Linux
* Flash Media Server 3.5.6 and earlier versions for Windows and Linux
* Adobe Flash Player 10.3.181.36 and earlier versions for Windows, Macintosh, Linux, and Solaris operating systems
* Adobe Flash Player 10.3.185.25 and earlier versions for Android
* Adobe AIR 2.7 and earlier versions for Windows, Macintosh, and Android
* Adobe Photoshop CS5 and CS5.1 and earlier versions for Windows and Macintosh
* RoboHelp 9 (versions 9.0.1.232 and earlier), RoboHelp 8, RoboHelp Server 9, and RoboHelp Server 8 for Windows
Overview
There are multiple vulnerabilities in Adobe Shockwave Player, Flash
Media Server, Flash Player, Photoshop CS5, and RoboHelp. Adobe has
released updates to address these vulnerabilities.
I. Description
Adobe security bulletins APSB11-19, APSB11-20, APSB11-21,
APSB11-22, and APSB11-23 describe multiple vulnerabilities in Adobe
Shockwave Player, Flash Media Server, Flash Player, Photoshop CS5,
and RoboHelp. An attacker may use these vulnerabilities to run
malicious code or cause a denial of service on an affected system.
Adobe has released updates to address these vulnerabilities.
II. Impact
These vulnerabilities could allow an attacker to run malicious code
on the affected system or cause a denial of service.
III. Solution
Users of these Adobe products should review the relevant Adobe
security bulletins and follow the recommendations in the "Solution"
section.
APSB11-19: Security update available for Adobe Shockwave Player
APSB11-20: Security update available for Adobe Flash Media Server
APSB11-21: Security update available for Adobe Flash Player
APSB11-22: Security update available for Adobe Photoshop CS5
APSB11-23: Security updates available for RoboHelp
IV. References
* Security update available for Adobe Shockwave Player -
<http://www.adobe.com/support/security/bulletins/apsb11-19.html>
* Security update available for Adobe Flash Media Server -
<http://www.adobe.com/support/security/bulletins/apsb11-20.html>
* Security update available for Adobe Flash Player -
<http://www.adobe.com/support/security/bulletins/apsb11-21.html>
* Security update available for Adobe Photoshop CS5 -
<http://www.adobe.com/support/security/bulletins/apsb11-22.html>
* Security updates available for RoboHelp -
<http://www.adobe.com/support/security/bulletins/apsb11-23.html>
____________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA11-222A.html>
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert em cert.org> with "TA11-222A Feedback VU#628023" in
the subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2011 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
August 10, 2011: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBTkKXaz6pPKYJORa3AQL/lQgAgO8eDjAJt7tFpd9jW8YY0yf92QY84f2r
TQcMgYyxhyyuA0joIWQ7k6BkszfNns03tr6k9ay2r2e3dICUhtgugh20yeoyV6ua
gwII/qNhPoVPlt3z3yJR4BQzhlyAYMlG4CKJWxX84Hkpq9FeQYDRO6Ni8WF2wiUC
eeT7feK10Q+3w0UZinW11Cz6GISqQeb8E0YVX7lNH8svA/Du9UdOFnRgbWeBRtM9
4Fj+eRVdYqxpxy7z85EPIGwrKIop/D/HXaaNpXbkru1iXkLvAbBi2hpd4aeaQHva
wpaAuNYwv5WxbdmcarXuJqs3a0v9+Mwd39bf8OxqUXLUX8h4LyGWJA==
=QDsc
-----END PGP SIGNATURE-----
----- End forwarded message -----
Mais detalhes sobre a lista de discussão SECURITY-L