CERT mailing list archives

Current Activity - Adobe Releases Security Update for Adobe Shockwave Player


From: Current Activity <us-cert () us-cert gov>
Date: Wed, 13 Feb 2013 13:03:29 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System

US-CERT Current Activity
Adobe Releases Security Update for Adobe Shockwave Player

Original release date: February 13, 2013
Last revised: --

Adobe has released a security update for Adobe Shockwave Player to
address multiple vulnerabilities. Exploitation of these vulnerabilities
may allow an attacker to execute arbitrary code.

Adobe has released updates for the following versions:
 * Adobe Shockwave Player 11.6.8.638 and earlier versions for Windows
and Macintosh
US-CERT encourages users and administrators to review Adobe Security
Bulletin APSB13-06 and apply any necessary updates to help mitigate the
risk.

Relevant URL(s):
<http://www.adobe.com/support/security/bulletins/apsb13-06.html>


____________________________________________________________________

   Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/current/#adobe_releases_security_advisory_for17

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBURvVZ3dnhE8Qi3ZhAQJbAggAnY1ULlmZ8LnzvVJCUskfYz+1kCUcCGJd
n/0R2w4c/COVF6iRUs1YpyiD10i/P31D28f91uJnEa8K0O9wUffs9GDGq/WvR2ud
43y3z93Ag7kfRWJUUCUEiiNVwQNMp3ELeZFz23qEQpKYch+7LxgH/Ks9UrkqzPtb
vnUtCApodIVtyzXlZHCOq4Jy3w+OzkPEOo2Cw95oWTZSU9n5gKY4vJfSSWXA09mg
RkHThh8Qhi+FRYrYTBKIoQYK8ZlHCP58J+pQe/zAj4Opntbpv6QWnK4QBhjwdvsG
GgY7z7PAAxjmrsZKPJIJHI7k0q3yQ8gG+whvkl1N+Z2fAYqda73xaQ==
=mDKk
-----END PGP SIGNATURE-----


Current thread: