RHEL 3 / 4 : flash-plugin (RHSA-2009:0334)

high Nessus Plugin ID 63873

Synopsis

The remote Red Hat host is missing a security update.

Description

An updated Adobe Flash Player package that fixes several security issues is now available for Red Hat Enterprise Linux 3 and 4 Extras.

This update has been rated as having critical security impact by the Red Hat Security Response Team.

The flash-plugin package contains a Firefox-compatible Adobe Flash Player Web browser plug-in.

Multiple input validation flaws were found in the way Flash Player displayed certain SWF (Shockwave Flash) content. An attacker could use these flaws to create a specially crafted SWF file that could cause flash-plugin to crash, or, possibly, execute arbitrary code when the victim loaded a page containing the specially crafted SWF content.
(CVE-2009-0520, CVE-2009-0519)

All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 9.0.159.0.

Solution

Update the affected flash-plugin package.

See Also

https://www.redhat.com/security/data/cve/CVE-2009-0519.html

https://www.redhat.com/security/data/cve/CVE-2009-0520.html

http://www.adobe.com/support/security/bulletins/apsb09-01.html

http://www.adobe.com/products/flashplayer/

http://rhn.redhat.com/errata/RHSA-2009-0334.html

Plugin Details

Severity: High

ID: 63873

File Name: redhat-RHSA-2009-0334.nasl

Version: 1.10

Type: local

Agent: unix

Published: 1/24/2013

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:flash-plugin, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.7

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2/25/2009

Reference Information

CVE: CVE-2009-0519, CVE-2009-0520, CVE-2009-0521, CVE-2009-0522

CWE: 119, 20, 200

RHSA: 2009:0334