Показать сообщение отдельно
Старый 23.03.2011, 09:16   #6 (permalink)
den777555777
Member
 
Регистрация: 22.03.2011
Сообщений: 411
Сказал(а) спасибо: 0
Поблагодарили 0 раз(а) в 0 сообщениях
Репутация: 332
По умолчанию

Выполнение произвольного кода в Adobe Flash Player

Программа: Adobe Flash Player 9.0.262, 10.0.45.2 и более ранние версии.

Опасность: Критическая

Наличие эксплоита: Нет

Описание: Уязвимость позволяет удаленному пользователю скомпрометировать целевую систему. Уязвимость существует из-за неизвестной ошибки, которая позволяет удаленному пользователю выполнить произвольный код на целевой системе. Подробности уязвимости не сообщаются.

Примечание: уязвимость активно эксплуатируется злоумышленниками в настоящее время.

URL производителя: Adobe

Решение: Способов устранения уязвимости не существует в настоящее время.

Security Advisory for Flash Player, Adobe Reader and Acrobat
Release date: June 4, 2010

Vulnerability identifier: APSA10-01

CVE number: CVE-2010-1297

Platform: All

SummaryA critical vulnerability exists in Adobe Flash Player 10.0.45.2 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems, and the authplay.dll component that ships with Adobe Reader and Acrobat 9.x for Windows, Macintosh and UNIX operating systems. This vulnerability (CVE-2010-1297) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being actively exploited in the wild against both Adobe Flash Player, and Adobe Reader and Acrobat. This advisory will be updated once a schedule has been determined for releasing a fix.

Affected software versionsAdobe Flash Player 10.0.45.2, 9.0.262, and earlier 10.0.x and 9.0.x versions for Windows, Macintosh, Linux and Solaris
Adobe Reader and Acrobat 9.3.2 and earlier 9.x versions for Windows, Macintosh and UNIX

Note:
The Flash Player 10.1 Release Candidate available at Flash Player Developer Center | Adobe Developer Connection does not appear to be vulnerable.
Adobe Reader and Acrobat 8.x are confirmed not vulnerable.

MItigationsAdobe Flash Player
The Flash Player 10.1 Release Candidate available at Flash Player Developer Center | Adobe Developer Connection does not appear to be vulnerable.

Adobe Reader and Acrobat
Deleting, renaming, or removing access to the authplay.dll file that ships with Adobe Reader and Acrobat 9.x mitigates the threat for those products, but users will experience a non-exploitable crash or error message when opening a PDF file that contains SWF content.

The authplay.dll that ships with Adobe Reader and Acrobat 9.x for Windows is typically located at C:\Program Files\Adobe\Reader 9.0\Reader\authplay.dll for Adobe Reader or C:\Program Files\Adobe\Acrobat 9.0\Acrobat\authplay.dll for Acrobat.


Severity ratingAdobe categorizes this as a critical issue.

DetailsA critical vulnerability exists in Adobe Flash Player 10.0.45.2 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems, and the authplay.dll component that ships with Adobe Reader and Acrobat 9.x for Windows, Macintosh and UNIX operating systems. This vulnerability (CVE-2010-1297) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being actively exploited in the wild against both Adobe Flash Player, and Adobe Reader and Acrobat.

The Flash Player 10.1 Release Candidate available at Flash Player Developer Center | Adobe Developer Connection does not appear to be vulnerable.

Adobe Reader and Acrobat 8.x are confirmed not vulnerable. Mitigation is available for Adobe Reader and Acrobat 9.x customers as detailed above.

Adobe actively shares information about this and other vulnerabilities with partners in the security community to enable them to quickly develop detection and quarantine methods to protect users until a patch is available. As always, Adobe recommends that users follow security best practices by keeping their anti-malware software and definitions up to date.

This advisory will be updated once a schedule has been determined for releasing a fix. Users may monitor the latest information on the Adobe Product Security Incident Response Team blog at the following URL: Adobe Product Security Incident Response Team (PSIRT) Blog or by subscribing to the RSS feed here: http://blogs.adobe.com/psirt/atom.xml.
den777555777 вне форума  
Ads

Яндекс

Member
 
Регистрация: 31.10.2006
Сообщений: 40200
Записей в дневнике: 0
Сказал(а) спасибо: 0
Поблагодарили 0 раз(а) в 0 сообщениях
Репутация: 55070