CERT mailing list archives

Current Activity - Security Updates Available for Adobe Flash Player


From: Current Activity <us-cert () us-cert gov>
Date: Wed, 27 Feb 2013 10:56:10 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System
Security Updates Available for Adobe Flash Player

Original release date: February 27, 2013

Adobe has released security updates for Adobe Flash Player. These
updates address vulnerabilities that could cause a crash and potentially
allow an attacker to take control of an affected system.
Adobe is aware of reports that CVE-2013-0643 and CVE-2013-0648 are being
exploited in the wild in targeted attacks designed to trick the user
into clicking a link that directs to a website serving malicious Flash
(SWF) content.
Security updates are available for the following versions of Adobe Flash
Player:
 * Adobe Flash Player 11.6.602.168 and earlier versions for Windows
 * Adobe Flash Player 11.6.602.167 and earlier versions for Macintosh
 * Adobe Flash Player 11.2.202.270 and earlier versions for Linux

US-CERT encourages users and administrators to review Adobe Security
Bulletin APSB13-08 and follow best practice security policies to
determine if their organization is affected and the appropriate
response.

Relevant URL(s):
<http://www.adobe.com/support/security/bulletins/apsb13-08.html>

____________________________________________________________________

   Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/ncas/current-activity/2013/02/27/Security-Updates-Available-Adobe-Flash-Player

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBUS4sg3dnhE8Qi3ZhAQJIuQf9FuM7LXU/owzk+bfjYO+btht2bsqttE0O
DSXEc4hMMB4XXVg81y4xzZcvqgCnVTucbLdlNn/mXwPvsKo74DiMXkcot6+Kw539
7SNuf94kmwwTitpXkBRrpt0jg6VOX5ooochvYag9ptUEg1CvnUFKPf9JCCAtk4i2
5OO8NSF1XCyKuxT0KMp7v8iBsGesOXYQ4IvIPCnkMgrXpF8xElytEf358dKdI8pR
/2JmpgFPQMLDsUUSd6TwgJt6/94KX/s0owqeJ3g3mtiA0XhH2Vwh37T244q8kT2J
qrbP51BmJorIDY8iflZjQn7XxR8cyZHXvO2oK8UjThteVl6VcA0t1w==
=0kSJ
-----END PGP SIGNATURE-----


Current thread: