Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0945 - Security Advisory
Issued:
2008-10-28
Updated:
2008-11-18

RHSA-2008:0945 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: flash-plugin security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated Adobe Flash Player package that fixes several security issues is
now available for Red Hat Enterprise Linux 5 Supplementary.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

[Updated 18th November 2008]
The erratum has been updated to include references to the additional
CVE-named issues that were not public at the time of release. The security
impact of the erratum has also been upgraded to Critical. No changes have
been made to the packages.

Description

The flash-plugin package contains a Firefox-compatible Adobe Flash Player
Web browser plug-in.

A flaw was found in the way Adobe Flash Player wrote content to the
clipboard. A malicious SWF file could populate the clipboard with a URL
that could cause the user to mistakenly load an attacker-controlled URL.
(CVE-2008-3873)

A flaw was found which allowed Adobe Flash Player's ActionScript to
initiate file uploads and downloads without user interaction.
FileReference.browse and FileReference.download calls can now only be
initiated via user interaction, such as mouse-clicks or key-presses on the
keyboard. (CVE-2008-4401)

A flaw was found in Adobe Flash Player's display of the Settings Manager
content. A malicious SWF file could trick the user into unknowingly
clicking a link or dialog. This could then give the malicious SWF file
permission to access the local machine's camera or microphone.
(CVE-2008-4503)

Flaws were found in the way Flash Player restricted the interpretation and
usage of cross-domain policy files. A remote attacker could use Flash
Player to conduct cross-domain and cross-site scripting attacks
(CVE-2007-4324, CVE-2007-6243). This update provides enhanced fixes for
these issues.

Adobe Flash Player 10 also includes bug fixes and feature enhancements
including:

  • improved stability on the Linux platform by fixing a race condition issue

in sound output.

  • new support for custom filters and effects, native 3D transformation and

animation, advanced audio processing, a new, more flexible text engine, and
GPU hardware acceleration.

For more information on new features and enhancements, see the Adobe Flash
Player site and the Adobe Labs Release Notes.

Note: some users may have installed a 3rd-party component, libflashsupport,
for older versions of Flash Player. Adobe Flash Player 10 no longer
supports libflashsupport. Users are advised to remove libflashsupport if
they have it installed.

All users of Adobe Flash Player should upgrade to this updated package,
which contains Flash Player version 10.0.12.36.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 252292 - CVE-2007-4324 Flash movie can determine whether a TCP port is open
  • BZ - 440664 - CVE-2007-6243 Flash Player cross-domain and cross-site scripting flaws
  • BZ - 465736 - CVE-2008-3873 flash: clipboard hijack attack
  • BZ - 466154 - CVE-2008-4401 flash-plugin: upload/download user interaction
  • BZ - 466344 - CVE-2008-4503 Adobe Flash Player clickjacking
  • BZ - 470116 - CVE-2008-4818 Flash Player XSS
  • BZ - 470123 - CVE-2008-4819 Flash Player DNS rebind attack
  • BZ - 470128 - CVE-2008-4823 Flash Player HTML injection flaw
  • BZ - 470130 - CVE-2008-4822 Flash Player policy file interpretation flaw
  • BZ - 470131 - CVE-2008-4821 Flash Player jar: protocol handler

CVEs

  • CVE-2007-4324
  • CVE-2007-6243
  • CVE-2008-3873
  • CVE-2008-4401
  • CVE-2008-4503
  • CVE-2008-4823
  • CVE-2008-4822
  • CVE-2008-4821
  • CVE-2008-4818
  • CVE-2008-4819
  • CVE-2008-4824
  • CVE-2008-5361
  • CVE-2008-5362
  • CVE-2008-5363

References

  • http://www.redhat.com/security/updates/classification/#critical
  • http://www.adobe.com/support/security/bulletins/apsb08-18.html
  • http://www.adobe.com/support/security/bulletins/apsb08-20.html
  • http://www.adobe.com/support/security/bulletins/apsb08-22.html
  • http://labs.adobe.com/technologies/flashplayer10/
  • http://www.adobe.com/products/flashplayer/
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
x86_64
flash-plugin-10.0.12.36-2.el5.i386.rpm SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b
i386
flash-plugin-10.0.12.36-2.el5.i386.rpm SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2

SRPM
x86_64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
x86_64
flash-plugin-10.0.12.36-2.el5.i386.rpm SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b
i386
flash-plugin-10.0.12.36-2.el5.i386.rpm SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b

Red Hat Enterprise Linux Desktop 5

SRPM
x86_64
flash-plugin-10.0.12.36-2.el5.i386.rpm SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b
i386
flash-plugin-10.0.12.36-2.el5.i386.rpm SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b

Red Hat Enterprise Linux Server from RHUI 5

SRPM
x86_64
flash-plugin-10.0.12.36-2.el5.i386.rpm SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b
i386
flash-plugin-10.0.12.36-2.el5.i386.rpm SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility