CERT mailing list archives

Current Activity - Adobe Releases Security Advisory for Flash Player


From: Current Activity <us-cert () us-cert gov>
Date: Tue, 14 Sep 2010 10:57:51 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

Adobe Releases Security Advisory for Flash Player

Original release date: September 14, 2010 at 10:35 am
Last revised: September 14, 2010 at 10:35 am


Adobe has released a security advisory to alert users of a
vulnerability affecting Adobe Flash Player. This vulnerability affects
Flash Player 10.1.82.76 and earlier versions for Windows, Macintosh,
Linux, Solaris, and Adobe Flash Player 10.1.92.10 for Android.
Exploitation of this vulnerability may allow an attacker to execute
arbitrary code or cause a denial-of-service condition.

US-CERT encourages users and administrators to do the following to
help mitigate the risks:
  * Review Adobe security advisory APSA10-03.
  * Review the Adobe Product Security Incident Response Team blog
    entry.
  * Review US-CERT Vulnerability Note VU#275289 and consider
    implementing the workarounds listed until a fix is available from
    the vendor.

US-CERT will provide additional information as it becomes available.

Relevant Url(s):
<http://www.kb.cert.org/vuls/id/275289>

<http://www.adobe.com/support/security/advisories/apsa10-03.html>

<http://blogs.adobe.com/psirt/2010/09/security-advisory-for-adobe-flash-player-apsa10-03.html>

====
This entry is available at
http://www.us-cert.gov/current/index.html#adobe_releases_security_advisory_for4

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTI+NZD6pPKYJORa3AQJ/Cgf9H2Pa3i1hlUoUy6yr3RJd8fQPoPF+nmg7
saDcptYo2/ClvT1JKEo/3uc3TK6l7Vz96JKfyO1mSw9iuMRj4PT3CdG8XPCMDxR0
JlofGJ4vwLVI5kXif+DIsDXu8nH95XTX0ZCwicFkLkPoaFMoRDOCzoCkrZw8JN6o
2HMvy75eyqgnifepBkcAml7JdV8EwFmaatfwqHtQzsPsdK2V+IRUKR+JEgOZa3fW
R8tPrYujEZnbO8k9U4ju5p7A3o34MayZxhEn1c905HUqSrOlJLWZHNFcgSLVarHg
z7dFIESUU6zV5FeutylNj0fraUVWDW/tSvtXqxV3hzNYgkNMCxQyDA==
=Qk16
-----END PGP SIGNATURE-----


Current thread: