Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 338529 - A critical vulnerability exists in www-plugins/adobe-flash-10.1.82.7
Summary: A critical vulnerability exists in www-plugins/adobe-flash-10.1.82.7
Status: RESOLVED DUPLICATE of bug 337204
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High critical (vote)
Assignee: Gentoo Security
URL: http://www.adobe.com/support/security...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2010-09-24 07:37 UTC by Pavel Shirov
Modified: 2010-09-24 07:39 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Pavel Shirov 2010-09-24 07:37:35 UTC
A critical vulnerability exists in Adobe Flash Player 10.1.82.76 and earlier versions for Windows, Macintosh, Linux, and Solaris, and Adobe Flash Player 10.1.92.10 for Android. This vulnerability also affects Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX, and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh. This vulnerability (CVE-2010-2884) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being actively exploited in the wild against Adobe Flash Player on Windows. Adobe is not aware of any attacks exploiting this vulnerability against Adobe Reader or Acrobat to date.

Adobe recommends users of Adobe Flash Player 10.1.82.76 and earlier versions for Windows, Macintosh, Linux, and Solaris update to Adobe Flash Player 10.1.85.3, and users of Adobe Flash Player 10.1.92.10 for Android update to Adobe Flash Player 10.1.95.1.

Reproducible: Always

Steps to Reproduce:
No known details and exploits are available. But there are viruses/worms for Windows which are currently actively exploits this vulnerability.



See also: http://secunia.com/advisories/41434
Comment 1 Pavel Shirov 2010-09-24 07:39:18 UTC

*** This bug has been marked as a duplicate of bug 337204 ***