From: Nicetameetya on


National Cyber Alert System

Technical Cyber Security Alert TA10-162A


Adobe Flash and AIR Vulnerabilities

Original release date: June 11, 2010
Last revised: --
Source: US-CERT


Systems Affected

* Adobe Flash Player 10.0.45.2 and earlier 10.x versions
* Adobe Flash Player 9.0.262 and earlier 9.x versions
* Adobe AIR 1.5.3.9130 and earlier versions

Other Adobe products that support Flash may also be vulnerable.


Overview

According to Adobe Security Bulletin APSB10-14, there are
vulnerabilities in Adobe Flash and AIR. These vulnerabilities
affect Flash Player, AIR, and possibly other products that support
Flash. A remote attacker could exploit these vulnerabilities to
execute arbitrary code.


I. Description

Adobe Security Bulletin APSB10-14 describes vulnerabilities in
Adobe Flash that affects Flash Player and AIR. It may also affect
other products that independently support Flash, such as Adobe
Reader, Acrobat, Photoshop, Photoshop Lightroom, Freehand MX, and
Fireworks.

An attacker could exploit these vulnerabilities by convincing a
user to open specially crafted Flash content. Flash content is
commonly hosted on a web page, but it can also be embedded in a PDF
and other documents or provided as a stand-alone file.

One of these vulnerabilities, CVE-2010-1297, is being exploited
against Flash Player, Adobe Reader, and Acrobat. Additional
information about CVE-2010-1297 is available in US-CERT Technical
Cyber Security Alert TA10-159A and US-CERT Vulnerability Note
VU#486225.


II. Impact

If a user opens specially crafted Flash content, a remote attacker
may be able to execute arbitrary code.


III. Solution

Update Flash and AIR

Adobe Security Bulletin APSB10-14 recommends updating to Flash
Player 10.1.53.64 or 9.0.277.0 and AIR to 2.0.2.12610. This will
update the Flash web browser plug-in and ActiveX control and AIR,
but will not update Flash support in Adobe Reader, Acrobat, or
other products.

To reduce your exposure to these and other Flash vulnerabilities,
consider the following mitigation technique.

Disable Flash in your web browser

Uninstall Flash or restrict which sites are allowed to run Flash.
To the extent possible, only run trusted Flash content on trusted
domains. For more information, see Securing Your Web Browser.


IV. References

* Adobe Security Bulletin APSB10-14 -
<http://www.adobe.com/support/security/bulletins/apsb10-14.html>

* Technical Cyber Security Alert TA10-159A -
<http://www.us-cert.gov/cas/techalerts/TA10-159A.html>

* US-CERT Vulnerability Report VU#486225 -
<http://www.kb.cert.org/vuls/id/486225>

* Securing Your Web Browser -
<http://www.us-cert.gov/reading_room/securing_browser/>

* CVE-2010-1297 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297>

____________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA10-162A.html>
From: Craig on
On 06/11/2010 06:55 PM, Nicetameetya wrote:

That's odd. The cyber alert I rec'd was a bit different....
>
> Overview
>
> Here we go again
>
>
> I. Description
>
> Products which are bloated & leaky, like your morbidly obese
> uncle Roscoe after his colostomy
>
> II. Impact
>
> More admin'ing, less computing
>
>
> III. Solution
>
> HTML5
>
>
> IV. References
>
> * HTML5 Overview
> <http://dev.w3.org/html5/spec/Overview.html>
>
> * Latest HTML5 Draft Specification
> <http://www.w3.org/TR/html5/>
>
> * Adobe accused of blocking HTML5 spec-
> <http://www.geek.com/articles/chips/adobe-responds-to-accusations-of-blocking-html5-spec-to-protect-flash-20100215/>
>
--
-Craig
From: John Corliss on
Nicetameetya wrote:
>
>
> National Cyber Alert System
>
> Technical Cyber Security Alert TA10-162A
>
>
> Adobe Flash and AIR Vulnerabilities
>
> Original release date: June 11, 2010
> Last revised: --
> Source: US-CERT
>
>
> Systems Affected
>
> * Adobe Flash Player 10.0.45.2 and earlier 10.x versions
> * Adobe Flash Player 9.0.262 and earlier 9.x versions
> * Adobe AIR 1.5.3.9130 and earlier versions (snip)

So... I just updated Adobe Flash Player to the latest version. As I did
so, I noticed that the plugin at some point was named "Adobe Flash
Powered by getPlus+(R)". After the installation, the name listed in the
Firefox Plugin list is simply "Shockwave Flash".

I also noticed that there is now a new third party extension listed
named "Adobe DLM (powered by getPlus (R)".

You might say that it's not a third party extension because it has
"Adobe" in its name, but I checked my firewall's rules and it's just
named "getPlus+(R)".

This is entirely unacceptable. To me, it looks like Adobe came up with a
scare tactic to get users of Flash to install this "getPlus+(R)" POS, so
I just removed that third party extension.

Maybe Adobe is scrambling to make some kind of change to Flash Player
which will make it necessary even if you're using an HTML5 capable
browser? I don't know. All I know is that I've been sick and tired of
Flash and its invasive bullshit for a long time.

--
John Corliss BS206. Because of all the Googlespam, I block all posts
sent through Google Groups. I also block as many posts from anonymous
remailers (like x-privat.org for eg.) as possible due to forgeries
posted through them.

No ad, CD, commercial, cripple, demo, nag, share, spy, time-limited,
trial or web wares OR warez for me, please. Adobe Flash sucks, DivX rules.
From: John Corliss on
John Corliss wrote:
> Nicetameetya wrote:
>>
>>
>> National Cyber Alert System
>>
>> Technical Cyber Security Alert TA10-162A
>>
>>
>> Adobe Flash and AIR Vulnerabilities
>>
>> Original release date: June 11, 2010
>> Last revised: --
>> Source: US-CERT
>>
>>
>> Systems Affected
>>
>> * Adobe Flash Player 10.0.45.2 and earlier 10.x versions
>> * Adobe Flash Player 9.0.262 and earlier 9.x versions
>> * Adobe AIR 1.5.3.9130 and earlier versions (snip)
>
> So... I just updated Adobe Flash Player to the latest version. As I did
> so, I noticed that the plugin at some point was named "Adobe Flash
> Powered by getPlus+(R)". After the installation, the name listed in the
> Firefox Plugin list is simply "Shockwave Flash".
>
> I also noticed that there is now a new third party extension listed
> named "Adobe DLM (powered by getPlus (R)".
>
> You might say that it's not a third party extension because it has
> "Adobe" in its name, but I checked my firewall's rules and it's just
> named "getPlus+(R)".
>
> This is entirely unacceptable. To me, it looks like Adobe came up with a
> scare tactic to get users of Flash to install this "getPlus+(R)" POS, so
> I just removed that third party extension.
>
> Maybe Adobe is scrambling to make some kind of change to Flash Player
> which will make it necessary even if you're using an HTML5 capable
> browser? I don't know. All I know is that I've been sick and tired of
> Flash and its invasive bullshit for a long time.

And yes, I know that the "DLM" in the 3rd party extension name stands
for "DownLoad Manager". I'll take my chances and do without it.

--
John Corliss BS206. Because of all the Googlespam, I block all posts
sent through Google Groups. I also block as many posts from anonymous
remailers (like x-privat.org for eg.) as possible due to forgeries
posted through them.

No ad, CD, commercial, cripple, demo, nag, share, spy, time-limited,
trial or web wares OR warez for me, please. Adobe Flash sucks, DivX rules.
From: Gordon Darling on
On Sat, 12 Jun 2010 02:11:25 -0700, John Corliss wrote:

<snip>

> And yes, I know that the "DLM" in the 3rd party extension name stands
> for "DownLoad Manager". I'll take my chances and do without it.

Adobe Forum discussion

http://forums.adobe.com/thread/449779

Regards
Gordon





--
ox·y·mo·ron
n. pl. ox·y·mo·ra or ox·y·mo·rons
A rhetorical figure in which incongruous or contradictory terms are
combined, as in Microsoft Security, Microsoft Help and Microsoft Works.