Security update available for Adobe Flash Player
Release date: February 8, 2011
Vulnerability identifier: APSB11-02
CVE Numbers: CVE-2011-0558, CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0575, CVE-2011-0577, CVE-2011-0578, CVE-2011-0607, CVE-2011-0608
Platform: All Platforms
Summary
Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.
Adobe recommends users of Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris update to Adobe Flash Player 10.2.152.26.
Affected software versions
Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris
To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Solution
Adobe recommends all users of Adobe Flash Player 10.1.102.64 and earlier versions upgrade to the newest version 10.2.152.26 by downloading it from the Adobe Flash Player Download Center. Windows users can install the update via the auto-update mechanism within the product when prompted.
Severity rating
Adobe categorizes this as a critical update and recommends affected users update their installation to the newest version.
Details
Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.
This update resolves an integer overflow vulnerability that could lead to code execution (CVE-2011-0558).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0559).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0560, CVE-2011-0561).
This update resolves multiple memory corruption vulnerabilities that could lead to code execution (CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574).
This update resolves a library-loading vulnerability that could lead to code execution (CVE-2011-0575).
This update resolves a font-parsing vulnerability that could lead to code execution (CVE-2011-0577).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0578).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0607).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0608).
Adobe recommends users of Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris update to Adobe Flash Player 10.2.152.26.
Affected software
Recommended player update
Availability
Flash Player 10.1.102.64 and earlier
10.2.152.26
Flash Player Download Center
Flash Player 10.1.102.64 and earlier - network distribution
10.2.152.26
Flash Player Licensing
Flash Professional CS5, Flash CS4 Professional and Flex 4
10.2.152.26
Flash Player Support Center
Acknowledgements
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
* Vitaliy Toropov through iDefense's Vulnerability Contributor Program (CVE-2011-0558)
* An Anonymous Researcher reported through iDefense's Vulnerability Contributor Program (CVE-2011-0559)
* Will Dormann of CERT (CVE-2011-0560, CVE-2011-0561)
* Bo Qu of Palo Alto Networks (CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574)
* Simon Raner of ACROS Security (CVE-2011-0575)
* Marc Schoenefeld of Red Hat Security Response Team (CVE-2011-0577)
* An anonymous reporter through TippingPoint's Zero Day Initiative (CVE-2011-0578)
* Tavis Ormandy of the Google Security Team (CVE-2011-0607, CVE-2011-0608)