- Issued:
- 2008-10-28
- Updated:
- 2008-11-18
RHSA-2008:0945 - Security Advisory
Synopsis
Critical: flash-plugin security update
Type/Severity
Security Advisory: Critical
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated Adobe Flash Player package that fixes several security issues is
now available for Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
[Updated 18th November 2008]
The erratum has been updated to include references to the additional
CVE-named issues that were not public at the time of release. The security
impact of the erratum has also been upgraded to Critical. No changes have
been made to the packages.
Description
The flash-plugin package contains a Firefox-compatible Adobe Flash Player
Web browser plug-in.
A flaw was found in the way Adobe Flash Player wrote content to the
clipboard. A malicious SWF file could populate the clipboard with a URL
that could cause the user to mistakenly load an attacker-controlled URL.
(CVE-2008-3873)
A flaw was found which allowed Adobe Flash Player's ActionScript to
initiate file uploads and downloads without user interaction.
FileReference.browse and FileReference.download calls can now only be
initiated via user interaction, such as mouse-clicks or key-presses on the
keyboard. (CVE-2008-4401)
A flaw was found in Adobe Flash Player's display of the Settings Manager
content. A malicious SWF file could trick the user into unknowingly
clicking a link or dialog. This could then give the malicious SWF file
permission to access the local machine's camera or microphone.
(CVE-2008-4503)
Flaws were found in the way Flash Player restricted the interpretation and
usage of cross-domain policy files. A remote attacker could use Flash
Player to conduct cross-domain and cross-site scripting attacks
(CVE-2007-4324, CVE-2007-6243). This update provides enhanced fixes for
these issues.
Adobe Flash Player 10 also includes bug fixes and feature enhancements
including:
- improved stability on the Linux platform by fixing a race condition issue
in sound output.
- new support for custom filters and effects, native 3D transformation and
animation, advanced audio processing, a new, more flexible text engine, and
GPU hardware acceleration.
For more information on new features and enhancements, see the Adobe Flash
Player site and the Adobe Labs Release Notes.
Note: some users may have installed a 3rd-party component, libflashsupport,
for older versions of Flash Player. Adobe Flash Player 10 no longer
supports libflashsupport. Users are advised to remove libflashsupport if
they have it installed.
All users of Adobe Flash Player should upgrade to this updated package,
which contains Flash Player version 10.0.12.36.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 252292 - CVE-2007-4324 Flash movie can determine whether a TCP port is open
- BZ - 440664 - CVE-2007-6243 Flash Player cross-domain and cross-site scripting flaws
- BZ - 465736 - CVE-2008-3873 flash: clipboard hijack attack
- BZ - 466154 - CVE-2008-4401 flash-plugin: upload/download user interaction
- BZ - 466344 - CVE-2008-4503 Adobe Flash Player clickjacking
- BZ - 470116 - CVE-2008-4818 Flash Player XSS
- BZ - 470123 - CVE-2008-4819 Flash Player DNS rebind attack
- BZ - 470128 - CVE-2008-4823 Flash Player HTML injection flaw
- BZ - 470130 - CVE-2008-4822 Flash Player policy file interpretation flaw
- BZ - 470131 - CVE-2008-4821 Flash Player jar: protocol handler
CVEs
References
- http://www.redhat.com/security/updates/classification/#critical
- http://www.adobe.com/support/security/bulletins/apsb08-18.html
- http://www.adobe.com/support/security/bulletins/apsb08-20.html
- http://www.adobe.com/support/security/bulletins/apsb08-22.html
- http://labs.adobe.com/technologies/flashplayer10/
- http://www.adobe.com/products/flashplayer/
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
x86_64 | |
flash-plugin-10.0.12.36-2.el5.i386.rpm | SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b |
i386 | |
flash-plugin-10.0.12.36-2.el5.i386.rpm | SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2
SRPM | |
---|---|
x86_64 | |
i386 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
x86_64 | |
flash-plugin-10.0.12.36-2.el5.i386.rpm | SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b |
i386 | |
flash-plugin-10.0.12.36-2.el5.i386.rpm | SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
x86_64 | |
flash-plugin-10.0.12.36-2.el5.i386.rpm | SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b |
i386 | |
flash-plugin-10.0.12.36-2.el5.i386.rpm | SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
x86_64 | |
flash-plugin-10.0.12.36-2.el5.i386.rpm | SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b |
i386 | |
flash-plugin-10.0.12.36-2.el5.i386.rpm | SHA-256: 1b29bd5eea4e44527ac9e130d09dc8a48d5eabd11c503904968588e803b3c58b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.