Adobe Flash Player unspecified information disclosure

flash-unspecified-information-disclosure (48904) The risk level is classified as LowLow Risk

Description:

An unspecified error in Adobe Flash Player binary when running on Linux could allow a remote attacker to obtain sensitive information using unknown attack vectors.

*CVSS:

Base Score: 4.3
  Access Vector: Network
  Access Complexity: Medium
  Authentication: None
  Confidentiality Impact: Partial
  Integrity Impact: None
  Availability Impact: None
 
Temporal Score: 3.2
  Exploitability: Unproven
  Remediation Level: Official-Fix
  Report Confidence: Confirmed

Consequences:

Obtain Information

Remedy:

Refer to APSB09-01 for patch, upgrade or suggested workaround information. See References.

References:

  • Adobe Product Security Bulletin APSB09-01: Flash Player update available to address security vulnerabilities .
  • BID-33889: Adobe Flash Player Unspecified Information Disclosure Vulnerability
  • CVE-2009-0521: Untrusted search path vulnerability in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 on Linux allows local users to obtain sensitive information or gain privileges via a crafted library in a directory contained in the RPATH.
  • GLSA-200903-23: Adobe Flash Player: Multiple vulnerabilities
  • RHSA-2009-0332: Critical: flash-plugin security update
  • SA34012: Adobe Flash Player Multiple Vulnerabilities
  • SUSE-SA:2009:011: Adobe Flash Player security update

Platforms Affected:

  • Adobe Flash Player 10.0.15.3
  • Gentoo Linux
  • Novell Linux Desktop 9
  • Novell OpenSUSE 10.3
  • Novell OpenSUSE 11.0
  • Novell SUSE Linux Enterprise Desktop 10 SP2
  • RedHat RHEL Desktop Supplementary 5 Client
  • RedHat RHEL Supplementary 5 Server
  • RedHat RHEL Supplementary 5.3.z EUS
  • SUSE SuSE Linux 9.0
  • Turbolinux Client 2008
  • Turbolinux Turbolinux FUJI
  • Turbolinux Turbolinux wizpy

Reported:

Feb 24, 2009

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page