You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa Adobe Flash Player

Sigurnosni nedostatak programskog paketa Adobe Flash Player

  • Detalji os-a: WN7
  • Važnost: URG
  • Operativni sustavi: W, M, L, O
  • Kategorije: ALL, VIS, W08, WN7, WN8, W12, W10, LRH, LSU, LUB, APL

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Adobe Security Bulletin:

APSA16-03: Security advisory for Adobe Flash Player
APSB16-19: Security update available for the Adobe DNG SDK
APSB16-20: Security update available for Adobe Brackets
APSB16-21: Security update available for the Creative Cloud Desktop Application
APSB16-22: Security hotfixes available for ColdFusion

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

APSA16-03: Security advisory for Adobe Flash Player

Originally posted: June 14, 2016

Summary:
A critical vulnerability (CVE-2016-4171) exists in Adobe Flash Player 21.0.0.242 and earlier versions for Windows, Macintosh, Linux, and Chrome OS. Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system.

Adobe is aware of a report that an exploit for CVE-2016-4171 exists in the wild, and is being used in limited, targeted attacks. Adobe will address this vulnerability in our monthly security update, which will be available as early as June 16. For the latest information, users may monitor the Adobe Product Security Incident Response Team blog.

Learn more: http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef61

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

APSB16-19: Security update available for the Adobe DNG SDK

Originally posted: June 14, 2016

Summary:
Adobe has released a security update for the Adobe DNG SDK for Windows and Macintosh. This update resolves a memory corruption vulnerability (CVE-2016-4167), and Adobe recommends users update their product installations using the instructions provided in the Solution section of the security bulletin.

Learn more: http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef62

Priority rating:

Adobe categorizes this update as priority 3.

http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef63

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

APSB16-20: Security update available for Adobe Brackets

Originally posted: June 14, 2016

Summary:
Adobe has released a security update for Adobe Brackets for Windows, Macintosh and Linux. This update resolves a JavaScript injection vulnerability (CVE-2016-4164) and a vulnerability in the extension manager (CVE-2016-4165). Adobe recommends users update their product installation using the instructions provided in the Solution section of the security bulletin.

Learn more: http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef64

Priority rating:

Adobe categorizes this update as priority 3.

http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef65

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

APSB16-21: Security update available for the Creative Cloud Desktop Application

Originally posted: June 14, 2016

Summary:
Adobe has released a security update for the Creative Cloud Desktop Application. This update resolves an untrusted search path vulnerability in the Creative Cloud Desktop Application installer (CVE-2016-4157), and an unquoted service path enumeration vulnerability in the Creative Cloud Desktop Application (CVE-2016-4158).

Learn more: http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef66

Priority rating:

Adobe categorizes this update as priority 3.

http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef67

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

APSB16-22: Security hotfixes available for ColdFusion

Originally posted: June 14, 2016

Summary:
Adobe has released security hotfixes for ColdFusion versions 10, 11 and the 2016 release. These hotfixes resolve an input validation issue that could be exploited to conduct cross-site scripting attacks (CVE-2016-4159). Adobe recommends that customers apply the appropriate hotfix using the instructions provided in the “Solution” section below.

Learn more: http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef68

Priority rating:

Adobe categorizes these hotfixes as priority 2.

http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef69

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

ANY INFORMATION, PATCHES, DOWNLOADS, WORKAROUNDS, OR FIXES
PROVIDED BY ADOBE IN THIS BULLETIN ARE PROVIDED “AS IS”
WITHOUT WARRANTY OF ANY KIND. ADOBE AND ITS SUPPLIERS
DISCLAIM ALL WARRANTIES, WHETHER EXPRESS OR IMPLIED OR
OTHERWISE, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. ALSO, THERE IS NO WARRANTY
OF NON-INFRINGEMENT, TITLE, OR QUIET ENJOYMENT. (USA ONLY)
SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED
WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. IN
NO EVENT SHALL ADOBE, INC. OR ITS SUPPLIERS BE LIABLE FOR
ANY DAMAGES WHATSOEVER INCLUDING, WITHOUT LIMITATION,
DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL,
PUNITIVE, COVER, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR
THE LIKE, OR LOSS OF BUSINESS DAMAGES, BASED ON ANY THEORY
OF LIABILITY INCLUDING BREACH OF CONTRACT, BREACH OF
WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR
OTHERWISE, EVEN IF ADOBE, INC. OR ITS SUPPLIERS OR THEIR
REPRESENTATIVES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. (USA ONLY) SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL
DAMAGES, SO THE ABOVE EXCLUSION OR LIMITATION MAY NOT APPLY
TO YOU AND YOU MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY
FROM STATE TO STATE.

Adobe reserves the right, from time to time, to update the
information in this document with current information.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PLEASE DO NOT REPLY TO THIS MESSAGE. To obtain information
on how to contact Adobe, visit the web at:
http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef6a
or call 800-833-6687.

(C) 2016 Adobe Systems Incorporated. All rights reserved.

To ensure future delivery of email, please add email@mail.adobesystems.com to your address book, contacts, or safe sender list.

Adobe is registered trademark of Adobe Systems Incorporated
in the United States and/or other countries. Copyright 2015
Adobe Systems Incorporated. All rights reserved. This is an
advertising message from Adobe Systems Incorporated, its
affiliates and agents (“Adobe”), 345 Park Avenue, San Jose,
CA 95110 USA. If you’d prefer not to receive e-mail like
this from Adobe in the future, please unsubscribe:
http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef6b&p1=%40CaLzS1bWYM1p3CgsbORczg%3D%3D

Your privacy is important to us. Please review Adobe’s online
Privacy Policy by clicking here:
http://t.info.adobesystems.com//r/?id=t4a4a4dba,45f34aa1,4608ef6c

AutorMarko Stanec
Cert idNCERT-REF-2016-06-0077-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa libav

Otkriven je sigurnosni nedostatak u programskom paketu libav za operacijski sustav Debian. Otkriveni nedostatak potencijalnim napadačima omogućuju prepisivanje cjelobrojne varijable...

Close