Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 487142 - (CVE-2009-0520) CVE-2009-0520 flash-plugin: Buffer overflow (arbitrary code execution) via crafted SWF file.
CVE-2009-0520 flash-plugin: Buffer overflow (arbitrary code execution) via cr...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
urgent Severity urgent
: ---
: ---
Assigned To: Red Hat Product Security
source=adobe,reported=20090217,public...
: Security
Depends On: 487287 487288
Blocks:
  Show dependency treegraph
 
Reported: 2009-02-24 09:34 EST by Jan Lieskovsky
Modified: 2009-05-01 09:37 EDT (History)
8 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-02-26 03:19:04 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:0332 normal SHIPPED_LIVE Critical: flash-plugin security update 2009-02-25 18:56:53 EST
Red Hat Product Errata RHSA-2009:0334 normal SHIPPED_LIVE Critical: flash-plugin security update 2009-02-25 18:57:39 EST

  None (edit)
Description Jan Lieskovsky 2009-02-24 09:34:17 EST
A buffer overflow flaw was found in the Adobe Flash Player for Linux 10.0.12.36
that could allow attacker to execute arbitrary code on the user's
system when crafted SWF file was opened by a victim.
Comment 1 Jan Lieskovsky 2009-02-25 05:42:14 EST
This issue now public:

http://www.adobe.com/support/security/bulletins/apsb09-01.html
Comment 3 Red Hat Product Security 2009-02-26 03:19:04 EST
This issue was addressed in:

Red Hat Enterprise Linux Extras:
  http://rhn.redhat.com/errata/RHSA-2009-0332.html
  http://rhn.redhat.com/errata/RHSA-2009-0334.html

Note You need to log in before you can comment on or make changes to this bug.