TITLE: Adobe Flash Player Multiple Vulnerabilities Criticality level: Highly critical Impact: Security Bypass, System access Where: From remote Software: Adobe AIR 3.x Adobe Flash Player 11.x SECUNIA ADVISORY ID: http://secunia.com/advisories/51213/ DESCRIPTION: Multiple vulnerabilities have been reported in Adobe Flash Player and Adobe AIR, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. 1-5) An unspecified error exists and can be exploited to cause a buffer overflow. 6) An unspecified error exists and can be exploited to corrupt memory. 7) An unspecified error exists and can be exploited to bypass certain security features. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the following products: * Adobe Flash Player 11.4.402.287 and earlier versions for Windows and Macintosh. * Adobe Flash Player 11.2.202.243 and earlier versions for Linux. * Adobe Flash Player 11.1.115.20 and earlier versions for Android 4.x. * Adobe Flash Player 11.1.111.19 and earlier versions for Android 3.x and 2.x. * Adobe AIR 3.4.0.2710 and earlier for Windows, Macintosh, SDK (including AIR for iOS) and Android. SOLUTION: Update to a fixed version. ORIGINAL ADVISORY: Adobe (APSB12-24): http://www.adobe.com/support/security/bulletins/apsb12-24.html ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-