Adobe Security Bulletin Summary for February 2013

Number: AV13-009
Date: February 14, 2013

Purpose

The purpose of this advisory is to bring attention to the monthly Adobe Security Bulletin Summary for February. The summary covers three critical bulletins, which address multiple vulnerabilities in some Adobe products.

Assessment

Adobe has released the following security bulletins:

APSB13-04 –Adobe Flash Player

Details: This critical update addresses vulnerabilities that are being actively exploited in the wild in targeted attacks either by hosting malicious flash content on websites that target Flash Player in Firefox or Safari, or in a Microsoft Word document delivered as an email attachment. Exploitation of these vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.

Affected Products:

CVE Reference: CVE-2013-0633, CVE-2013-0634

https://www.adobe.com/support/security/bulletins/apsb13-04.html   

APSB13-05 – Adobe Flash Player

Details: This critical update addresses vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system. It also resolves a buffer overflow, an integer overflow, memory corruption and use-after-free vulnerability that could lead to code execution or information disclosure.

Affected Products:

CVE References: CVE-2013-1372, CVE-2013-0645, CVE-2013-1373, CVE-2013-1369, CVE-2013-1370, CVE-2013-1366, CVE-2013-0649, CVE-2013-1365, CVE-2013-1374, CVE-2013-1368, CVE-2013-0642, CVE-2013-0644, CVE-2013-0647, CVE-2013-1367, CVE-2013-0639, CVE-2013-0638, CVE-2013-0637

https://www.adobe.com/support/security/bulletins/apsb13-05.html   

APSB13-06 - Adobe Shockwave Player

Details: This update addresses vulnerabilities that could allow an attacker to cause a memory corruption or stack overflow that could lead to code execution on the affected system. 

Affected Product:
Adobe Shockwave Player 11.6.8.638 and earlier versions for Windows and Macintosh.

CVE Reference: CVE-2013-0635, CVE-2013-0636

https://www.adobe.com/support/security/bulletins/apsb13-06.html  

Suggested action

CCIRC recommends that system administrators identify their affected assets and potential interdependencies with organization's critical services and follow their patch management process accordingly.

Adobe recommends users update their product installations to the latest versions.

References:
https://www.adobe.com/support/security

Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.
http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/_fl/CCIRCPublicPGPKey.txt

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589
E-mail: ps.communications-communications.sp@canada.ca

Date modified: