Alert GCSA-15023 - Aggiornamenti di sicurezza per prodotti Adobe
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-15023
Data : 16 Luglio 2015
Titolo : Aggiornamenti di sicurezza per prodotti Adobe
******************************************************************
:: Descrizione del problema
Adobe ha rilasciato alcuni aggiornamenti di sicurezza che risolvono
vulnerabilita' presenti in Adobe Flash Player, Adobe Shockwave Player e
Acrobat/Reader.
Maggiori dettagli sono disponibili nella segnalazioni ufficiali alla
sezione "Riferimenti".
:: Software interessato
Flash Player:
18.0.0.203 e precedenti per Windows e Machintosh
13.0.0.302 e precedenti per Windows e Machintosh
18.0.0.204 e precedenti per Linux
11.2.202.481 e precedenti per Linux
Acrobat/Reader:
10.1.14 e precedenti
11.0.11 e precedenti
Adobe Shockwave Player:
12.1.8.158 e precedenti
Per verificare la versione di Flash Player installata accedere alla seguente
pagina
http://www.adobe.com/products/flash/about/
se si utilizzano piu' browser effettuare il controllo da ognuno di essi.
:: Impatto
Esposizione e modifica di informazioni utente e di sistema
Esecuzione remota di codice arbitrario
Completo controllo da remoto della macchina affetta
:: Soluzioni
Applicare le soluzioni consigliate nei bollettini Adobe.
:: Riferimenti
Bollettini Adobe sulla sicurezza
https://helpx.adobe.com/security.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
https://helpx.adobe.com/security/products/reader/apsb15-15.html
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-04.html
https://helpx.adobe.com/security/products/shockwave/apsb15-17.html
https://helpx.adobe.com/security/products/flash-player/apsb15-18.html
Security Tracker
http://www.securitytracker.com/id/1032890
http://www.securitytracker.com/id/1032891
http://www.securitytracker.com/id/1032892
Mitre CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4435
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4443
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4444
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4445
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4446
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4451
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4452
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5085
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5086
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5087
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5089
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5101
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5104
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5106
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5108
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5121
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5122
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5123
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlWngggACgkQwZxMk2USYEI4xwCg0nNV4FSRmwSQ+dwB5L7y0g8c
h7UAoNAkH8qwH5XoKM5zw7+5gCDb2uvJ
=dL29
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-15023
Data : 16 Luglio 2015
Titolo : Aggiornamenti di sicurezza per prodotti Adobe
******************************************************************
:: Descrizione del problema
Adobe ha rilasciato alcuni aggiornamenti di sicurezza che risolvono
vulnerabilita' presenti in Adobe Flash Player, Adobe Shockwave Player e
Acrobat/Reader.
Maggiori dettagli sono disponibili nella segnalazioni ufficiali alla
sezione "Riferimenti".
:: Software interessato
Flash Player:
18.0.0.203 e precedenti per Windows e Machintosh
13.0.0.302 e precedenti per Windows e Machintosh
18.0.0.204 e precedenti per Linux
11.2.202.481 e precedenti per Linux
Acrobat/Reader:
10.1.14 e precedenti
11.0.11 e precedenti
Adobe Shockwave Player:
12.1.8.158 e precedenti
Per verificare la versione di Flash Player installata accedere alla seguente
pagina
http://www.adobe.com/products/flash/about/
se si utilizzano piu' browser effettuare il controllo da ognuno di essi.
:: Impatto
Esposizione e modifica di informazioni utente e di sistema
Esecuzione remota di codice arbitrario
Completo controllo da remoto della macchina affetta
:: Soluzioni
Applicare le soluzioni consigliate nei bollettini Adobe.
:: Riferimenti
Bollettini Adobe sulla sicurezza
https://helpx.adobe.com/security.html
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html
https://helpx.adobe.com/security/products/reader/apsb15-15.html
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
https://helpx.adobe.com/security/products/flash-player/apsa15-04.html
https://helpx.adobe.com/security/products/shockwave/apsb15-17.html
https://helpx.adobe.com/security/products/flash-player/apsb15-18.html
Security Tracker
http://www.securitytracker.com/id/1032890
http://www.securitytracker.com/id/1032891
http://www.securitytracker.com/id/1032892
Mitre CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4435
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4443
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4444
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4445
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4446
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4451
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4452
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5085
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5086
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5087
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5089
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5101
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5104
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5106
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5108
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5121
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5122
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5123
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlWngggACgkQwZxMk2USYEI4xwCg0nNV4FSRmwSQ+dwB5L7y0g8c
h7UAoNAkH8qwH5XoKM5zw7+5gCDb2uvJ
=dL29
-----END PGP SIGNATURE-----