[SECURITY-L] US-CERT Alert TA13-043A - Adobe Updates for Multiple Vulnerabilities
CSIRT - UNICAMP
security em unicamp.br
Qui Fev 14 12:01:42 -02 2013
----- Forwarded message from US-CERT Alerts <technical-alerts em us-cert.gov> -----
From: US-CERT Alerts <technical-alerts em us-cert.gov>
Subject: US-CERT Alert TA13-043A - Adobe Updates for Multiple Vulnerabilities
To: technical-alerts em us-cert.gov
Date: Tue, 12 Feb 2013 16:47:15 -0500
Organization: US-CERT - +1 202-205-5266
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Awareness System
US-CERT Alert TA13-043A
Adobe Updates for Multiple Vulnerabilities
Original release date: February 12, 2013
Last revised: --
Systems Affected
* Adobe Flash Player 11.5.502.149 and earlier versions for Windows and Macintosh
* Adobe Flash Player 11.2.202.262 and earlier versions for Linux
* Adobe Flash Player 11.1.115.37 and earlier versions for Android 4.x
* Adobe Flash Player 11.1.111.32 and earlier versions for Android 3.x and 2.x
* Adobe AIR 3.5.0.1060 and earlier versions
* Adobe AIR 3.5.0.1060 SDK and earlier versions
* Adobe Shockwave Player 11.6.8.638 and earlier versions for Windows and Macintosh
Overview
Select Adobe software products contain multiple vulnerabilities.
Adobe has released updates to address these vulnerabilities.
Description
Adobe Security Bulletin APSB13-05 and APSB13-06 describe multiple
vulnerabilities in Adobe software. Adobe has released updates to
address the vulnerabilities.
Impact
A remote, unauthenticated attacker could execute arbitrary code,
cause a denial of service, or gain unauthorized access to your
files or system.
Solution
Apply Updates
Adobe has provided updates for these vulnerabilities in Adobe
Security Bulletin APSB13-05 and APSB13-06.
References
* APSB13-05: Security updates available for Adobe Flash Player
<https://www.adobe.com/support/security/bulletins/apsb13-05.html>
* APSB13-06: Security updates available for Adobe Shockwave Player
<https://www.adobe.com/support/security/bulletins/apsb13-06.html>
Revision History
February 12, 2013: Initial release
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert em cert.org> with "TA13-043A Feedback VU#689711" in
the subject.
____________________________________________________________________
Produced by US-CERT, a government organization.
____________________________________________________________________
This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html
Privacy & Use policy:
http://www.us-cert.gov/privacy/
This document can also be found at
http://www.us-cert.gov/cas/techalerts/TA13-043A.html
For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBURqlO3dnhE8Qi3ZhAQIG2AgAjPa1V2DVAU2uHq3gkbyiBk7EN7AQc1WB
/GHGnyG+faN5+kToZu8ogkr/sNwWwBmlYwAUcIJ2JzA8O+0W2vG242c0HiAIecin
OevDgE830U0JDQcKukSqaEShA3a+UFCM5JnDn+qmsaG8jessCjHR2zmBpLSOhNa4
seCbxjVtyCe0RxxX4AjQD5cefgOGxblF5t2hjvrSe6TehUU8Zr9A5mnRfKiir4BO
iQhxIWP9N9rhPj+pdTE4ZLWLEyewvPmlMvEEtgU2CgRErvwYZlkKzEcLgV319oUO
wsdVF/M3HBVwrJGjuxUeHrBIxTto6JYq+df/mgQGA22VG95p28me0g==
=ADH6
-----END PGP SIGNATURE-----
----- End forwarded message -----
Mais detalhes sobre a lista de discussão SECURITY-L