SuSE 11.3 Security Update : flash-player (SAT Patch Number 9259)

critical Nessus Plugin ID 74088

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

Adobe flash-player was updated to version 11.2.202.359 to resolve several security issues :

- Remote attackers could execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors.
(CVE-2014-0510)

- Remote attackers could bypass the Same Origin Policy via unspecified vectors. (CVE-2014-0516)

- Bypass intended access restrictions via unspecified vectors. (CVE-2014-0517 / CVE-2014-0518 / CVE-2014-0519 / CVE-2014-0520) More information can be found at http://helpx.adobe.com/security/products/flash-player/ap sb14-14.html .

Solution

Apply SAT patch number 9259.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=877649

http://support.novell.com/security/cve/CVE-2014-0510.html

http://support.novell.com/security/cve/CVE-2014-0516.html

http://support.novell.com/security/cve/CVE-2014-0517.html

http://support.novell.com/security/cve/CVE-2014-0518.html

http://support.novell.com/security/cve/CVE-2014-0519.html

http://support.novell.com/security/cve/CVE-2014-0520.html

Plugin Details

Severity: Critical

ID: 74088

File Name: suse_11_flash-player-140515.nasl

Version: 1.9

Type: local

Agent: unix

Published: 5/19/2014

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.8

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:flash-player, p-cpe:/a:novell:suse_linux:11:flash-player-gnome, p-cpe:/a:novell:suse_linux:11:flash-player-kde4, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/15/2014

Reference Information

CVE: CVE-2014-0510, CVE-2014-0516, CVE-2014-0517, CVE-2014-0518, CVE-2014-0519, CVE-2014-0520