Copyright 2022 - CSIM - Asian Institute of Technology

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Subject: US-CERT Alert TA13-043A - Adobe Updates for Multiple Vulnerabilities
From: US-CERT Alerts <This email address is being protected from spambots. You need JavaScript enabled to view it.>
Date: Tue, 12 Feb 2013 18:11:54 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System

US-CERT Alert TA13-043A
Adobe Updates for Multiple Vulnerabilities

Original release date: February 12, 2013
Last revised: --

Systems Affected

     * Adobe Flash Player 11.5.502.149 and earlier versions for Windows and Macintosh
     * Adobe Flash Player 11.2.202.262 and earlier versions for Linux
     * Adobe Flash Player 11.1.115.37 and earlier versions for Android 4.x
     * Adobe Flash Player 11.1.111.32 and earlier versions for Android 3.x and 2.x
     * Adobe AIR 3.5.0.1060 and earlier versions
     * Adobe AIR 3.5.0.1060 SDK and earlier versions
     * Adobe Shockwave Player 11.6.8.638 and earlier versions for Windows and Macintosh


Overview

   Select Adobe software products contain multiple vulnerabilities.
   Adobe has released updates to address these vulnerabilities.


Description

   Adobe Security Bulletin APSB13-05 and APSB13-06 describe multiple
   vulnerabilities in Adobe software. Adobe has released updates to
   address the vulnerabilities.


Impact

   A remote, unauthenticated attacker could execute arbitrary code,
   cause a denial of service, or gain unauthorized access to your
   files or system.


Solution

   Apply Updates

   Adobe has provided updates for these vulnerabilities in Adobe
   Security Bulletin APSB13-05 and APSB13-06.


References

 * APSB13-05: Security updates available for Adobe Flash Player
   <https://www.adobe.com/support/security/bulletins/apsb13-05.html>

 * APSB13-06: Security updates available for Adobe Shockwave Player
   <https://www.adobe.com/support/security/bulletins/apsb13-06.html>


Revision History

  February 12, 2013: Initial release

 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <This email address is being protected from spambots. You need JavaScript enabled to view it.> with "TA13-043A Feedback VU#689711" in
   the subject.
 ____________________________________________________________________

   Produced by US-CERT, a government organization.
 ____________________________________________________________________

This product is provided subject to this Notification: 
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy: 
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/cas/techalerts/TA13-043A.html

For instructions on subscribing to or unsubscribing from this 
mailing list, visit http://www.us-cert.gov/cas/signup.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBURqlO3dnhE8Qi3ZhAQIG2AgAjPa1V2DVAU2uHq3gkbyiBk7EN7AQc1WB
/GHGnyG+faN5+kToZu8ogkr/sNwWwBmlYwAUcIJ2JzA8O+0W2vG242c0HiAIecin
OevDgE830U0JDQcKukSqaEShA3a+UFCM5JnDn+qmsaG8jessCjHR2zmBpLSOhNa4
seCbxjVtyCe0RxxX4AjQD5cefgOGxblF5t2hjvrSe6TehUU8Zr9A5mnRfKiir4BO
iQhxIWP9N9rhPj+pdTE4ZLWLEyewvPmlMvEEtgU2CgRErvwYZlkKzEcLgV319oUO
wsdVF/M3HBVwrJGjuxUeHrBIxTto6JYq+df/mgQGA22VG95p28me0g==
=ADH6
-----END PGP SIGNATURE-----


Powered by: MHonArc

Login Form

Search

School of Engineering and technologies     Asian Institute of Technology