English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 75516 CVE Beschreibungen
und 39786 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.69211
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2010:0867
Zusammenfassung:Redhat Security Advisory RHSA-2010:0867
Beschreibung:The remote host is missing updates announced in
advisory RHSA-2010:0867.

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.

This update fixes multiple vulnerabilities in Adobe Flash Player. These
vulnerabilities are detailed on the Adobe security page APSB10-26, listed
in the References section.

Multiple security flaws were found in the way flash-plugin displayed
certain SWF content. An attacker could use these flaws to create a
specially-crafted SWF file that would cause flash-plugin to crash or,
potentially, execute arbitrary code when the victim loaded a page
containing the specially-crafted SWF content. (CVE-2010-3639,
CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644,
CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649,
CVE-2010-3650, CVE-2010-3652, CVE-2010-3654)

An input validation flaw was discovered in flash-plugin. Certain server
encodings could lead to a bypass of cross-domain policy file restrictions,
possibly leading to cross-domain information disclosure. (CVE-2010-3636)

During testing, it was discovered that there were regressions with Flash
Player on certain sites, such as fullscreen playback on YouTube. Despite
these regressions, we feel these security flaws are serious enough to
update the package with what Adobe has provided.

All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 10.1.102.64.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2010-0867.html
http://www.redhat.com/security/updates/classification/#critical
http://www.adobe.com/support/security/bulletins/apsb10-26.html

Risk factor : Critical
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-3636
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
http://security.gentoo.org/glsa/glsa-201101-09.xml
HPdes Security Advisory: HPSBMA02663
http://marc.info/?l=bugtraq&m=130331642631603&w=2
HPdes Security Advisory: SSRT100428
http://www.redhat.com/support/errata/RHSA-2010-0829.html
http://www.redhat.com/support/errata/RHSA-2010-0834.html
http://www.redhat.com/support/errata/RHSA-2010-0867.html
SuSE Security Announcement: SUSE-SA:2010:055 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html
http://jvn.jp/en/jp/JVN48425028/index.html
http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000054.html
BugTraq ID: 44691
http://www.securityfocus.com/bid/44691
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12142
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15913
http://secunia.com/advisories/42183
http://secunia.com/advisories/42926
http://secunia.com/advisories/43026
http://www.vupen.com/english/advisories/2010/2903
http://www.vupen.com/english/advisories/2010/2906
http://www.vupen.com/english/advisories/2010/2918
http://www.vupen.com/english/advisories/2011/0173
http://www.vupen.com/english/advisories/2011/0192
Common Vulnerability Exposure (CVE) ID: CVE-2010-3639
BugTraq ID: 44692
http://www.securityfocus.com/bid/44692
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11310
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12625
Common Vulnerability Exposure (CVE) ID: CVE-2010-3640
BugTraq ID: 44675
http://www.securityfocus.com/bid/44675
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12179
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:16281
Common Vulnerability Exposure (CVE) ID: CVE-2010-3641
BugTraq ID: 44677
http://www.securityfocus.com/bid/44677
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12154
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:16161
Common Vulnerability Exposure (CVE) ID: CVE-2010-3642
BugTraq ID: 44678
http://www.securityfocus.com/bid/44678
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12065
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:16254
Common Vulnerability Exposure (CVE) ID: CVE-2010-3643
BugTraq ID: 44679
http://www.securityfocus.com/bid/44679
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12151
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:16242
Common Vulnerability Exposure (CVE) ID: CVE-2010-3644
BugTraq ID: 44680
http://www.securityfocus.com/bid/44680
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11660
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:16220
Common Vulnerability Exposure (CVE) ID: CVE-2010-3645
BugTraq ID: 44681
http://www.securityfocus.com/bid/44681
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11905
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15961
Common Vulnerability Exposure (CVE) ID: CVE-2010-3646
BugTraq ID: 44682
http://www.securityfocus.com/bid/44682
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11922
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:16183
Common Vulnerability Exposure (CVE) ID: CVE-2010-3647
BugTraq ID: 44683
http://www.securityfocus.com/bid/44683
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12095
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:16160
Common Vulnerability Exposure (CVE) ID: CVE-2010-3648
BugTraq ID: 44684
http://www.securityfocus.com/bid/44684
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11842
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15980
Common Vulnerability Exposure (CVE) ID: CVE-2010-3649
BugTraq ID: 44685
http://www.securityfocus.com/bid/44685
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11872
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15750
Common Vulnerability Exposure (CVE) ID: CVE-2010-3650
BugTraq ID: 44686
http://www.securityfocus.com/bid/44686
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11636
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15971
Common Vulnerability Exposure (CVE) ID: CVE-2010-3652
BugTraq ID: 44687
http://www.securityfocus.com/bid/44687
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11965
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15284
Common Vulnerability Exposure (CVE) ID: CVE-2010-3654
http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html
http://security.gentoo.org/glsa/glsa-201101-08.xml
http://www.redhat.com/support/errata/RHSA-2010-0934.html
SuSE Security Announcement: SUSE-SA:2010:058 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html
TurboLinux Advisory: TLSA-2011-2
http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt
CERT/CC vulnerability note: VU#298081
http://www.kb.cert.org/vuls/id/298081
BugTraq ID: 44504
http://www.securityfocus.com/bid/44504
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:13294
http://www.securitytracker.com/id?1024659
http://www.securitytracker.com/id?1024660
http://secunia.com/advisories/41917
http://secunia.com/advisories/42030
http://secunia.com/advisories/42401
http://secunia.com/advisories/43025
http://securityreason.com/securityalert/8210
http://www.vupen.com/english/advisories/2010/3111
http://www.vupen.com/english/advisories/2011/0191
http://www.vupen.com/english/advisories/2011/0344
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 39786 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.