SECURITY ADVISORY Volume 2017-054-1

SECURITY ADVISORY Volume 2017-054-1

Security Advisory | Volume 2017‐054‐1 PRODUCT DESCRIPTION AFFECTED VERSIONS OTHER INFORMATION Published - February 09, 2017 CVE-2017-5397 Mozilla Firefox for Android <51.0.3 Remote Mozilla Firefox for Android before 51.0.3 is prone to an unspecified vulnerability due to improper Version(s): Mozilla Firefox CVSS - 9.3 Unspecified Vulnerability configuration of the cache directory, updated as world writable. before 51.0.3 Vendor's Advisory Available at : https://www.mozilla.org/en- US/firefox/android/ Published - February 14, 2017 CVE-2017-2985 Adobe Flash Player <=24.0.0.194 Remote Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable use after free vulnerability Version(s): Adobe Flash CVSS - 9.3 Code Execution due to a Use-After-Free in the ActionScript 3 BitmapData class. Successful exploitation could lead to arbitrary code Player versions 24.0.0.194 Vendor's Advisory Available at: Issue - CVE-2017-2985 execution. and earlier. https://helpx.adobe.com/security/products/flash-player/apsb17- 04.html Published - February 14, 2017 CVE-2017-2987 Adobe Flash Player <=24.0.0.194 Remote Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable integer overflow Version(s): Adobe Flash CVSS - 9.3 Code Execution due to an Integer-Overflow vulnerability related to Flash Broker COM. Successful exploitation could lead to arbitrary code Player versions 24.0.0.194 Vendor's Advisory Available at : Issue - CVE-2017-2987 execution. Https://helpx.adobe.com/security/products/flash- player/apsb17-04.html Published - February 14, 2017 Adobe Flash Player versions 24.0.0.194 and earlier, running on Windows 8.1, Windows Server Microsoft Security Update for Adobe Flash Version(s): Adobe Flash CVE-2017-2984 2012, Server 2012 R2, Windows 10 and Windows Server 2016, have an exploitable heap overflow Player Heap-Buffer-Overflow Issue - CVE- Player versions 24.0.0.194 CVSS - 9.3 vulnerability in the h264 decoder routine. Successful exploitation could lead to arbitrary code 2017-2984 and earlier. Vendor's Advisory Available at: execution. https://portal.msrc.microsoft.com/en-us/eula Published - February 14, 2017 Adobe Flash Player versions 24.0.0.194 and earlier, running on Windows 8.1, Windows Server CVE-2017-2991 Microsoft Security Update for Adobe Flash Version(s): Adobe Flash 2012, Server 2012 R2, Windows 10 and Windows Server 2016, have an exploitable memory CVSS - 9.3 Player Memory-Corruption Issue - CVE- Player versions 24.0.0.194 corruption vulnerability in the h264 codec (related to decompression). Successful exploitation could Vendor's Advisory Available at : 2017-2991 and earlier. lead to arbitrary code execution. https://helpx.adobe.com/security/products/flash-player/apsb17- 04.html Published - February 14, 2017 CVE-2017-3792 Adobe Flash Player <=24.0.0.194 Remote Version(s):Adobe Flash Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption CVSS - 10.0 Code Execution due to a Memory- Player versions 24.0.0.194 vulnerability in Primetime SDK. Successful exploitation could lead to arbitrary code execution. Vendor's Advisory Available at: Corruption Issue - CVE-2017-2996 and earlier. https://tools.cisco.com/security/center/content/CiscoSecurityA dvisory/cisco-sa-20170125-telepresence Published - February 21, 2017 Adobe Flash Player versions 24.0.0.194 and earlier, running on Windows 8.1, Windows Server CVE-2017-2982 Microsoft Security Update for Adobe Flash Version(s): Adobe Flash 2012, Server 2012 R2, Windows 10 and Windows Server 2016, have an exploitable use after free CVSS - 9.3 Player Use-After-Free Issue - CVE-2017- Player versions 24.0.0.194 vulnerability in a routine related to player shutdown. Successful exploitation could lead to arbitrary Vendor's Advisory Available at : 2982 and earlier. code execution. https://helpx.adobe.com/security/products/flash-player/apsb17- 04.html Published - February 21, 2017 Oracle Java allows a remote attacker to bypass firewall restrictions and inject commands via TCP SBV-68859 Oracle Java Remote MITM, XXE Attacks connections .This issue exists due to improper handling of carriage returns and line feeds in Version(s):Oracle JDK and CVSS - 10.0 due to Improper Handling of Usernames in usernames in the FTP URL (sun.net.ftp.impl.FtpClient). The flaw may be leveraged to carry out JRE all versions. Vendor's Advisory Available at: FTP URL man-in-the-middle attacks, server-side request forgery, XML external Entity attacks or to send http://www.theregister.co.uk/2017/02/21/java_python_ftp_cod unauthorized email from Java applications. This vulnerability was published by SecurityFocus. e_vulnerable/ Published - February 14, 2017 Adobe Flash Player versions 24.0.0.194 and earlier, running on Windows 8.1, Windows Server Microsoft Security Update for Adobe Flash Version(s): Adobe Flash CVE-2017-2986 2012, Server 2012 R2, Windows 10 and Windows Server 2016, have an exploitable heap overflow Player Heap-Buffer-Overflow Issue - CVE- Player versions 24.0.0.194 CVSS - 9.3 vulnerability in the Flash Video (FLV) codec. Successful exploitation could lead to arbitrary code 2017-2986 and earlier Vendor's Advisory Available at : execution. https://portal.msrc.microsoft.com/en-us/eula Published - February 14, 2017 Adobe Flash Player versions 24.0.0.194 and earlier, running on Windows 8.1, Windows Server CVE-2017-2992 Microsoft Security Update for Adobe Flash Version(s): Adobe Flash 2012, Server 2012 R2, Windows 10 and Windows Server 2016, have an exploitable heap overflow CVSS - 9.3 Player Heap-Buffer-Overflow Issue - CVE- Player versions 24.0.0.194 vulnerability when parsing an MP4 header. Successful exploitation could lead to arbitrary code Vendor's Advisory Available at: 2017-2992 and earlier. execution. https://helpx.adobe.com/security/products/flash-player/apsb17- 04.html Cautela Labs | 5080 N. 40th Street, Suite 300 | Phoenix, AZ 85018 | 800‐997‐8132 [email protected] | www.cautelalabs.com.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    1 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us