TITLE: Adobe Flash Player Unspecified Code Execution Vulnerability Adobe Reader/Acrobat authplay.dll Code Execution Vulnerability Criticality level: Highly critical Impact: System access Where: From remote SECUNIA ADVISORY ID: http://secunia.com/advisories/44119/ Software: Adobe Reader and Acrobat 9.x + DESCRIPTION: A vulnerability has been reported in Adobe Flash Player, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error when parsing certain Flash content and allows execution of arbitrary code. The vulnerability is reported in the following versions: * Adobe Flash Player 10.2.153.1 and earlier versions for Windows, Macintosh, Linux, and Solaris * Adobe Flash Player 10.2.154.25 and earlier for Chrome * Adobe Flash Player 10.2.156.12 and earlier for Android The vulnerability is caused due to a vulnerable bundled version of Flash Player (authplay.dll). NOTE: The vulnerability is currently being actively exploited via Office Word documents (.doc) containing malicious Flash content. SOLUTION: Do not visit untrusted sites nor open untrusted files. ORIGINAL ADVISORY: Adobe: http://www.adobe.com/support/security/advisories/apsa11-02.html http://blogs.adobe.com/psirt/2011/04/security-advisory-for-adobe-flash-player-adobe-reader-and-acrobat-apsa11-02.html contagio: http://contagiodump.blogspot.com/2011/04/apr-8-cve-2011-0611-flash-player-zero.html ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-