You are here

T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

April 21, 2011 - 3:03am

Addthis

PROBLEM:

The vulnerability is due to improper processing of Adobe Flash content. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view malicious Flash (.swf) files with the affected software. If successful, the attacker could execute arbitrary code or cause a DoS condition on the targeted system.

PLATFORM:

Adobe Flash Player versions prior to 10.2.153.1 for Microsoft Windows, Apple Macintosh, Linux, and Solaris systems
Adobe Flash Player versions prior to 10.2.156.12 for Android systems
Adobe Reader and Acrobat versions prior to 10.0.2 for Microsoft Windows and Apple Macintosh systems
AIR 2.6.19120 and prior

ABSTRACT:

Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

referenceĀ  LINKS:

Adobe Security Update: APSB11-07
IntelliShield ID: 22909
CVE-2011-0611
MS Mitigation Experience Toolkit v2.0
Blocking Exploit Attempts of the Recent Flash 0-Day

IMPACT ASSESSMENT:

High

Discussion:

A critical vulnerability has been identified in Adobe Flash Player 10.2.153.1 and earlier versions (Adobe Flash Player 10.2.154.25 and earlier for Chrome users) for Windows, Macintosh, Linux, and Solaris, and Adobe Flash Player 10.2.156.12 and earlier versions for Android. This vulnerability (CVE-2011-0611), as referenced in Security Advisory APSA11-02, could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via a malicious Web page, or a Flash (.swf) file embedded in a Microsoft Word (.doc) or Microsoft Excel (.xls) file delivered as an email attachment, targeting the Windows platform.

Adobe recommends users of Adobe Flash Player 10.2.153.1 and earlier versions (Adobe Flash Player 10.2.154.25 and earlier versions for Chrome users) for Windows, Macintosh, Linux, and Solaris update to Adobe Flash Player 10.2.159.1 (Adobe Flash Player 10.2.154.27 for Chrome users). Adobe recommends users of Adobe AIR 2.6.19120 and earlier versions for Windows, Macintosh and Linux update to Adobe AIR 2.6.19140. Adobe expects to make available an update for Adobe Flash Player 10.2.156.12 and earlier versions for Android no later than the week of April 25, 2011.


Update Reference to DOE-CIRC T-600

Impact:

An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code on an affected system with the privileges of a targeted user. If that user holds elevated privileges, the attacker could completely compromise the system. Failed exploit attempts could cause the application to terminate, which may result in a DoS condition.

Solution:

Adobe recommends all users of Adobe Flash Player 10.2.153.1 and earlier versions for Windows, Macintosh, Linux, and Solaris upgrade to the newest version 10.2.159.1 by downloading it from the Adobe Flash Player Download Center. Windows users can install the update via the auto-update mechanism within the product when prompted. Google Chrome users can update to Chrome version 10.0.648.205 or later. Adobe recommends users of Adobe AIR 2.6.19120 and earlier versions for Windows, Macintosh and Linux update to Adobe AIR 2.6.19140. Adobe expects to make available an update for Adobe Flash Player 10.2.156.12 and earlier versions for Android no later than the week of April 25, 2011.

Recommended Update:
1. Adobe Flash Player 10.2.159.1
2. Adobe Flash Player licensing
3. Google Chrome Update
4. Adobe AIR 2.6
5. Red Hat flash-plugin security update

Addthis