US CERT - Adobe Flash - SA08-149A
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1 National Cyber Alert System Cyber Security Alert SA08-149A Exploitation of Adobe Flash Vulnerability Original release date: May 28, 2008 Last revised: -- Source: US-CERT Systems Affected Microsoft Windows, Apple Mac OS X, and other operating systems that use Adobe Flash Player Overview A vulnerability that affects Adobe Flash Player is being actively exploited to install malicious software. Solution Apply Updates Adobe has provided updates to remedy these vulnerabilities. To obtain the updates, visit the Adobe Player Download Center. Description Adobe Flash Player is affected by multiple vulnerabilities. If you open a malicious Flash file, which may be hosted on a website, an attacker may be able to take control of your computer or cause it to crash. The Adobe Security Bulletin provides updates that address these vulnerabilities. This issue was first published in US-CERT Cyber Security Alert SA08-100A. However, recent reports indicate that at least one of these vulnerabilities is being actively exploited at the time of this document's publication. For more technical information, see US-CERT Technical Cyber Security Alert TA08-149A. References * US-CERT Technical Cyber Security Alert TA08-149A.html - http://www.us-cert.gov/cas/techalerts/TA08-149A.html * Securing Your Web Browser - http://www.us-cert.gov/reading_room/securing_browser/ * Adobe PSIRT Potential Flash Player Issue - update - http://blogs.adobe.com/psirt/2008/05/potential_flash_player_issue_u_1.html * Adobe Security Advisory APSB08-011 - http://www.adobe.com/support/security/bulletins/apsb08-11.html * Adobe Flash Player Download Center - http://www.adobe.com/go/getflash * US-CERT Vulnerability Notes for Adobe Security advisory APSB08-011 - http://www.kb.cert.org/vuls/byid?searchview&query=APSB08-011 __________________________________________________ __________________ The most recent version of this document can be found at: http://www.us-cert.gov/cas/alerts/SA08-149A.html __________________________________________________ __________________ Feedback can be directed to US-CERT Technical Staff. Please send email to with "SA08-149A Feedback VU#395473" in the subject. __________________________________________________ __________________ For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html. __________________________________________________ __________________ Produced 2008 by US-CERT, a government organization. Terms of use: http://www.us-cert.gov/legal.html __________________________________________________ __________________ Revision History May 28, 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBSD3lKHIHljM+H4irAQLdnQf9F4qCZzTjuL8nqz1Us5 eYV50SMUcSMb0y 0+/TpgSNGCBiqZArimt1na5VHIBgeSpzFiWAXdpru+R5zjdK9Y/BVHT3f7v83oLT o4MJD1cKXnJXSxMcG8x5WWFCl4XzHDPknBHK256MwYM5GQivBK YthoS6CTI+nVhv rE24V9bbPwz6BaaCESfL30fwX+IM1R2Je9+hZAg8Kurb0uKkHK bNOB3Zgr2lrKWO DHI3VESjHIqI1AxcE0uwl5M4UiEg8/L6bdqn1bWIKnc7FhmKOeDfwL52cStbTb8R eAazTFgOvpm/07yLbfk99igygG2o5HEuJGQCnfTsdplCvvNQ5PMe5Q== =BW2S -----END PGP SIGNATURE----- |
All times are GMT +1. The time now is 11:43 PM. |
Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Win98Banter.com