Subject: US-CERT Cyber Security Alert SA07-192A -- Adobe Flash Player Updates for Multiple Vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Cyber Security Alert SA07-192A Adobe Flash Player Updates for Multiple Vulnerabilities Original release date: July 11, 2007 Last revised: -- Source: US-CERT Systems Affected Microsoft Windows, Apple Mac OS X, and other operating systems that use the following products: * Adobe Flash Player Overview There are critical vulnerabilities in Adobe Flash player that may allow an attacker to take control of your computer. Solution Apply Updates Adobe has provided updates to remedy these vulnerabilities. To obtain the updates, visit the Adobe Player Download Center. Description Adobe Flash Player is affected by multiple vulnerabilities. If an attacker can convince you to open a malicious Flash file, which may be hosted on a web site, they may be able to take control of your computer or cause it to crash. The Adobe Security Bulletin provides updates that address these vulnerabilities. For more technical information, see US-CERT Technical Cyber Security Alert TA07-192A. References * US-CERT Technical Cyber Security Alert TA07-192A.html - * US-CERT Vulnerability Note VU#138457 - * US-CERT Vulnerability Note VU#730785 - * US-CERT Vulnerability Note VU#110297 - * Adobe - APSB07-12: Flash Player Update to Address Security Vulnerabilities - _________________________________________________________________ The most recent version of this document can be found at: _________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to with "SA07-192A Feedback VU#730785" in the subject. ________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit . ________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use Terms of use: _________________________________________________________________ Revision History July 11, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRpU0TvRFkHkM87XOAQKV9Af8DKlvasFJF/eibznmn/QpSm6e6YSY6l1P /4LvSP+gx/vGDb77MxEPmKNdsGTJ2to307TX4kG3AREh6bINZjtWSQpBPpO/XVP7 t0oC1SrkkY2R+JlPNDALLLxHn8N3qXsPCApfzBAtWpAtMGCTx2OmK0hKQwdXprDW en4doEaXWGKwC3gFVG2NLBFctOou4tJTC0imN6Mgsu587jRFuy91EKck3y5oyXyp G0H0kVVhzpaypgphHUurhTEvuP/qtSLvuH5tt3vl0aXAHaSc2Tfac0YeYvoRS1rE zcQpJ7exhSF2CknSPLrgFKyWRztrLfsA8jYSzL+zYzJEOU4cIfnEbw== =jmZ7 -----END PGP SIGNATURE----- -- Please remember to trim your replies (including this sentence and everything below it) and adjust the subject line as necessary. To unsubscribe or change your email settings: //www.freelists.org/webpage/pctechtalk To access our Archives: http://groups.yahoo.com/group/PCTechTalk/messages/ //www.freelists.org/archives/pctechtalk/