RHEL 5 / 6 : flash-plugin (RHSA-2015:1005)

critical Nessus Plugin ID 83431
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Red Hat host is missing a security update.

Description

An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.

Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.

This update fixes multiple vulnerabilities in Adobe Flash Player.
These vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09 listed in the References section.

Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082, CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087, CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)

A security bypass flaw was found in flash-plugin that could lead to the disclosure of sensitive information. (CVE-2015-3079)

Two memory information leak flaws were found in flash-plugin that could allow an attacker to potentially bypass ASLR (Address Space Layout Randomization) protection, and make it easier to exploit other flaws. (CVE-2015-3091, CVE-2015-3092)

All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.460.

Solution

Update the affected flash-plugin package.

See Also

https://helpx.adobe.com/security/products/flash-player/apsb15-09.html

https://access.redhat.com/errata/RHSA-2015:1005

https://access.redhat.com/security/cve/cve-2015-3092

https://access.redhat.com/security/cve/cve-2015-3093

https://access.redhat.com/security/cve/cve-2015-3091

https://access.redhat.com/security/cve/cve-2015-3090

https://access.redhat.com/security/cve/cve-2015-3077

https://access.redhat.com/security/cve/cve-2015-3079

https://access.redhat.com/security/cve/cve-2015-3088

https://access.redhat.com/security/cve/cve-2015-3089

https://access.redhat.com/security/cve/cve-2015-3086

https://access.redhat.com/security/cve/cve-2015-3087

https://access.redhat.com/security/cve/cve-2015-3084

https://access.redhat.com/security/cve/cve-2015-3085

https://access.redhat.com/security/cve/cve-2015-3082

https://access.redhat.com/security/cve/cve-2015-3083

https://access.redhat.com/security/cve/cve-2015-3080

https://access.redhat.com/security/cve/cve-2015-3078

Plugin Details

Severity: Critical

ID: 83431

File Name: redhat-RHSA-2015-1005.nasl

Version: 2.25

Type: local

Agent: unix

Published: 5/13/2015

Updated: 2/5/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:flash-plugin, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/13/2015

Vulnerability Publication Date: 5/13/2015

Exploitable With

Core Impact

Metasploit (Adobe Flash Player ShaderJob Buffer Overflow)

Reference Information

CVE: CVE-2015-3077, CVE-2015-3078, CVE-2015-3079, CVE-2015-3080, CVE-2015-3082, CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087, CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3091, CVE-2015-3092, CVE-2015-3093

BID: 74605, 74608, 74609, 74610, 74612, 74614, 74616, 74617

RHSA: 2015:1005