FreeBSD : linux-flashplugin -- remote code execution vulnerability (32b05547-6913-11e0-bdc4-001b2134ef46)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Adobe Product Security Incident Response Team reports :

A critical vulnerability exists in Flash Player 10.2.153.1 and earlier
versions (Adobe Flash Player 10.2.154.25 and earlier for Chrome users)
for Windows, Macintosh, Linux and Solaris, Adobe Flash Player
10.2.156.12 and earlier versions for Android, and the Authplay.dll
component that ships with Adobe Reader and Acrobat X (10.0.2) and
earlier 10.x and 9.x versions for Windows and Macintosh operating
systems.

This vulnerability (CVE-2011-0611) could cause a crash and potentially
allow an attacker to take control of the affected system. There are
reports that this vulnerability is being exploited in the wild in
targeted attacks via a malicious Web page or a Flash (.swf) file
embedded in a Microsoft Word (.doc) or Microsoft Excel (.xls) file
delivered as an email attachment, targeting the Windows platform. At
this time, Adobe is not aware of any attacks via PDF targeting Adobe
Reader and Acrobat. Adobe Reader X Protected Mode mitigations would
prevent an exploit of this kind from executing.

See also :

http://www.adobe.com/support/security/advisories/apsa11-02.html
http://www.nessus.org/u?41131039

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 53468 ()

Bugtraq ID:

CVE ID: CVE-2011-0611

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now