RHSA-2008_1047
Vulnerability from csaf_redhat - Published: 2008-12-19 17:52 - Updated: 2024-11-14 10:06Summary
Red Hat Security Advisory: flash-plugin security update
Severity
Critical
Notes
Topic: An updated Adobe Flash Player package that fixes a security issue is
now available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise
Linux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details: The flash-plugin package contains a Firefox-compatible Adobe Flash Player
Web browser plug-in.
A security flaw was found in the way Flash Player displayed certain SWF
(Shockwave Flash) content. This may have made it possible to execute
arbitrary code on a victim's machine, if the victim opened a malicious
Adobe Flash file. (CVE-2008-5499)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 10.0.15.3 for users of Red Hat Enterprise
Linux 5 Supplementary, and 9.0.152.0 for users of Red Hat Enterprise 3 and
4 Extras.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.
Vendor Fix
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
https://access.redhat.com/errata/RHSA-2008:1047
References
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated Adobe Flash Player package that fixes a security issue is\nnow available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise\nLinux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The flash-plugin package contains a Firefox-compatible Adobe Flash Player\nWeb browser plug-in.\n\nA security flaw was found in the way Flash Player displayed certain SWF\n(Shockwave Flash) content. This may have made it possible to execute\narbitrary code on a victim\u0027s machine, if the victim opened a malicious\nAdobe Flash file. (CVE-2008-5499)\n\nAll users of Adobe Flash Player should install this updated package, which\nupgrades Flash Player to version 10.0.15.3 for users of Red Hat Enterprise\nLinux 5 Supplementary, and 9.0.152.0 for users of Red Hat Enterprise 3 and\n4 Extras.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:1047",
"url": "https://access.redhat.com/errata/RHSA-2008:1047"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.adobe.com/support/security/bulletins/apsb08-24.html",
"url": "http://www.adobe.com/support/security/bulletins/apsb08-24.html"
},
{
"category": "external",
"summary": "http://www.adobe.com/products/flashplayer/",
"url": "http://www.adobe.com/products/flashplayer/"
},
{
"category": "external",
"summary": "476172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=476172"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_1047.json"
}
],
"title": "Red Hat Security Advisory: flash-plugin security update",
"tracking": {
"current_release_date": "2024-11-14T10:06:59+00:00",
"generator": {
"date": "2024-11-14T10:06:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2008:1047",
"initial_release_date": "2008-12-19T17:52:00+00:00",
"revision_history": [
{
"date": "2008-12-19T17:52:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-12-19T12:52:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:06:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 3 Extras",
"product_id": "3AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3 Extras",
"product": {
"name": "Red Hat Desktop version 3 Extras",
"product_id": "3Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 3 Extras",
"product_id": "3ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 3 Extras",
"product_id": "3WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "flash-plugin-0:9.0.152.0-1.el4.i386",
"product": {
"name": "flash-plugin-0:9.0.152.0-1.el4.i386",
"product_id": "flash-plugin-0:9.0.152.0-1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@9.0.152.0-1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"product": {
"name": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"product_id": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@9.0.152.0-1.el3.with.oss?arch=i386"
}
}
},
{
"category": "product_version",
"name": "flash-plugin-0:10.0.15.3-2.el5.i386",
"product": {
"name": "flash-plugin-0:10.0.15.3-2.el5.i386",
"product_id": "flash-plugin-0:10.0.15.3-2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@10.0.15.3-2.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras",
"product_id": "3AS-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386"
},
"product_reference": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"relates_to_product_reference": "3AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386 as a component of Red Hat Desktop version 3 Extras",
"product_id": "3Desktop-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386"
},
"product_reference": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"relates_to_product_reference": "3Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras",
"product_id": "3ES-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386"
},
"product_reference": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"relates_to_product_reference": "3ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras",
"product_id": "3WS-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386"
},
"product_reference": "flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"relates_to_product_reference": "3WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.152.0-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:flash-plugin-0:9.0.152.0-1.el4.i386"
},
"product_reference": "flash-plugin-0:9.0.152.0-1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.152.0-1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:flash-plugin-0:9.0.152.0-1.el4.i386"
},
"product_reference": "flash-plugin-0:9.0.152.0-1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.152.0-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:flash-plugin-0:9.0.152.0-1.el4.i386"
},
"product_reference": "flash-plugin-0:9.0.152.0-1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.152.0-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:flash-plugin-0:9.0.152.0-1.el4.i386"
},
"product_reference": "flash-plugin-0:9.0.152.0-1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:10.0.15.3-2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:flash-plugin-0:10.0.15.3-2.el5.i386"
},
"product_reference": "flash-plugin-0:10.0.15.3-2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:10.0.15.3-2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:flash-plugin-0:10.0.15.3-2.el5.i386"
},
"product_reference": "flash-plugin-0:10.0.15.3-2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-5499",
"discovery_date": "2008-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "476172"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Linux-specific code execution flaw via crafted SWF file",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.152.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.152.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.152.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.152.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:10.0.15.3-2.el5.i386",
"5Server-Supplementary:flash-plugin-0:10.0.15.3-2.el5.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5499"
},
{
"category": "external",
"summary": "RHBZ#476172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=476172"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5499",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5499"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5499",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5499"
}
],
"release_date": "2008-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-12-19T17:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.152.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.152.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.152.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.152.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.152.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:10.0.15.3-2.el5.i386",
"5Server-Supplementary:flash-plugin-0:10.0.15.3-2.el5.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:1047"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Linux-specific code execution flaw via crafted SWF file"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…