Alert GCSA-13013 - APSB13-05 / APSB13-06 Aggiornamenti di sicurezza per Adobe
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-13013
Data : 13 Febbraio 2013
Titolo : APSB13-05 / APSB13-06 Aggiornamenti di sicurezza per Adobe
******************************************************************
:: Descrizione del problema
Adobe ha rilasciato due aggiornamenti di sicurezza che risolvono
alcune vulnerabilita' critiche presenti in Flash Player e
Shockwave Player.
Maggiori dettagli sono disponibili nella segnalazione ufficiale
alla sezione "Riferimenti".
:: Software interessato
Adobe Flash Player 11.5.502.149 e versioni precedenti per Windows
e Macintosh
Adobe Flash Player 11.2.202.262 e versioni precedenti per Linux
Adobe Flash Player 11.1.115.37 e versioni precedenti per Android 4.x
Adobe Flash Player 11.1.111.32 e versioni precedenti per Android 3.x
e 2.x
Adobe AIR 3.5.0.1060 e versioni precedenti
Adobe AIR 3.5.0.1060 SDK e versioni precedenti
Adobe Shockwave Player 11.6.8.638 e versioni precedenti per Windows
e Macintosh
Per verificare la versione di Flash Player installata accedere
alla seguente pagina
http://www.adobe.com/products/flash/about/
se si utilizzano piu' browser effettuare il controllo da ognuno
di essi.
:: Impatto
Esecuzione remota di codice arbitrario
Accesso non autorizzato al sistema
Denial of service
:: Soluzioni
Applicare gli aggiornamenti proposti nei bolletini di sicurezza
disponibili alle url:
http://get.adobe.com/flashplayer/
http://get.adobe.com/shockwave/
:: Riferimenti
APSB13-05 - Security updates available for Adobe Flash Player
https://www.adobe.com/support/security/bulletins/apsb13-05.html
APSB13-06 - Security updates available for Adobe Shockwave Player
https://www.adobe.com/support/security/bulletins/apsb13-06.html
Security Focus
http://www.securityfocus.com/bid/56896
http://www.securityfocus.com/bid/57788
http://www.securityfocus.com/bid/57787
http://www.securityfocus.com/bid/57906
http://www.securityfocus.com/bid/57908
http://www.securityfocus.com/bid/57931
US-CERT Alert TA13-043A
http://www.us-cert.gov/cas/techalerts/TA13-043A.html
Secunia
http://secunia.com/advisories/52166/
Mitre CVE
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1372
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0645
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1373
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1369
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1370
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1366
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0649
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1365
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1374
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1368
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0642
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0644
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0647
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1367
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0639
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0638
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0637
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0635
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0636
GARR CERT Newsletter subscribe/unsubscribe: http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlEbwxsACgkQwZxMk2USYEL67ACffJCdDsshGpWToXEPeoUq2QRv
JvcAoL5lRJiRh4kjNTSsMWJmPz0D1jrn
=Zc8i
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-13013
Data : 13 Febbraio 2013
Titolo : APSB13-05 / APSB13-06 Aggiornamenti di sicurezza per Adobe
******************************************************************
:: Descrizione del problema
Adobe ha rilasciato due aggiornamenti di sicurezza che risolvono
alcune vulnerabilita' critiche presenti in Flash Player e
Shockwave Player.
Maggiori dettagli sono disponibili nella segnalazione ufficiale
alla sezione "Riferimenti".
:: Software interessato
Adobe Flash Player 11.5.502.149 e versioni precedenti per Windows
e Macintosh
Adobe Flash Player 11.2.202.262 e versioni precedenti per Linux
Adobe Flash Player 11.1.115.37 e versioni precedenti per Android 4.x
Adobe Flash Player 11.1.111.32 e versioni precedenti per Android 3.x
e 2.x
Adobe AIR 3.5.0.1060 e versioni precedenti
Adobe AIR 3.5.0.1060 SDK e versioni precedenti
Adobe Shockwave Player 11.6.8.638 e versioni precedenti per Windows
e Macintosh
Per verificare la versione di Flash Player installata accedere
alla seguente pagina
http://www.adobe.com/products/flash/about/
se si utilizzano piu' browser effettuare il controllo da ognuno
di essi.
:: Impatto
Esecuzione remota di codice arbitrario
Accesso non autorizzato al sistema
Denial of service
:: Soluzioni
Applicare gli aggiornamenti proposti nei bolletini di sicurezza
disponibili alle url:
http://get.adobe.com/flashplayer/
http://get.adobe.com/shockwave/
:: Riferimenti
APSB13-05 - Security updates available for Adobe Flash Player
https://www.adobe.com/support/security/bulletins/apsb13-05.html
APSB13-06 - Security updates available for Adobe Shockwave Player
https://www.adobe.com/support/security/bulletins/apsb13-06.html
Security Focus
http://www.securityfocus.com/bid/56896
http://www.securityfocus.com/bid/57788
http://www.securityfocus.com/bid/57787
http://www.securityfocus.com/bid/57906
http://www.securityfocus.com/bid/57908
http://www.securityfocus.com/bid/57931
US-CERT Alert TA13-043A
http://www.us-cert.gov/cas/techalerts/TA13-043A.html
Secunia
http://secunia.com/advisories/52166/
Mitre CVE
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1372
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0645
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1373
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1369
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1370
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1366
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0649
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1365
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1374
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1368
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0642
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0644
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0647
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1367
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0639
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0638
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0637
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0635
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0636
GARR CERT Newsletter subscribe/unsubscribe: http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlEbwxsACgkQwZxMk2USYEL67ACffJCdDsshGpWToXEPeoUq2QRv
JvcAoL5lRJiRh4kjNTSsMWJmPz0D1jrn
=Zc8i
-----END PGP SIGNATURE-----