SUSE SLED11 安全性更新:flash-player (SUSE-SU-2015:2236-1)

critical Nessus Plugin ID 87317
新推出!Plugin 嚴重性目前使用 CVSS v3

計算 Plugin 嚴重性已更新為預設使用 CVSS v3 沒有 CVSS v3 評分的 Plugin 會回歸到以 CVSS v2 計算嚴重性。您可在設定下拉式選單中切換顯示嚴重性的喜好設定

Synopsis

遠端 SUSE 主機缺少一個或多個安全性更新。

描述

此更新針對 flash-player 11.2.202.554 版本,可修正 Adobe 安全性公告 APSB15-32 中的下列安全性問題。

- 這些更新可解決可能導致執行程式碼的堆積緩衝區溢位弱點 (CVE-2015-8438、CVE-2015-8446)。

- 這些更新可解決可能導致執行程式碼的記憶體損毀弱點 (CVE-2015-8444、CVE-2015-8443、CVE-2015-8417、CVE-2015-8416、CVE-2015-8451、CVE-2015-8047、CVE-2015-8455、CVE-2015-8045、CVE-2015-8418、CVE-2015-8060、CVE-2015-8419、CVE-2015-8408)。

- 這些更新可解決安全性繞過弱點 (CVE-2015-8453、CVE-2015-8440、CVE-2015-8409)。

- 這些更新可解決可能導致執行程式碼的堆疊溢位弱點 (CVE-2015-8407)。

- 這些更新可解決可能導致執行程式碼的類型混淆弱點 (CVE-2015-8439)。

- 這些更新可解決可能導致執行程式碼的整數溢位弱點 (CVE-2015-8445)。

- 這些更新可解決一個可能導致程式碼執行的緩衝區溢位弱點 (CVE-2015-8415)

- 這些更新可解決多個可能導致程式碼執行的釋放後使用弱點 (CVE-2015-8050、CVE-2015-8049、CVE-2015-8437、CVE-2015-8450、CVE-2015-8449、CVE-2015-8448、CVE-2015-8436、CVE-2015-8452、CVE-2015-8048、CVE-2015-8413、CVE-2015-8412、CVE-2015-8410、CVE-2015-8411、CVE-2015-8424、CVE-2015-8422、CVE-2015-8420、CVE-2015-8421、CVE-2015-8423、CVE-2015-8425、CVE-2015-8433、CVE-2015-8432、CVE-2015-8431、CVE-2015-8426、CVE-2015-8430、CVE-2015-8427、CVE-2015-8428、CVE-2015-8429、CVE-2015-8434、CVE-2015-8435、CVE-2015-8414、CVE-2015-8454、CVE-2015-8059、CVE-2015-8058、CVE-2015-8055、CVE-2015-8057、CVE-2015-8056、CVE-2015-8061、CVE-2015-8067、CVE-2015-8066、CVE-2015-8062、CVE-2015-8068、CVE-2015-8064、CVE-2015-8065、CVE-2015-8063、CVE-2015-8405、CVE-2015-8404、CVE-2015-8402、CVE-2015-8403、CVE-2015-8071、CVE-2015-8401、CVE-2015-8406、CVE-2015-8069、CVE-2015-8070、CVE-2015-8441、CVE-2015-8442、CVE-2015-8447)。

另請參閱 https://helpx.adobe.com/security/products/flash-player/apsb15-32.html

請注意,Tenable Network Security 已直接從 SUSE 安全性公告擷取前置描述區塊。Tenable 已盡量在不造成其他問題的前提下,嘗試自動清理並將其格式化。

解決方案

若要安裝此 SUSE 安全性更新,請使用 YaST online_update。
或者,也可以執行針對您的產品所列的命令:

SUSE Linux Enterprise Desktop 11-SP4:

zypper in -t patch sledsp4-flash-player-12254=1

SUSE Linux Enterprise Desktop 11-SP3:

zypper in -t patch sledsp3-flash-player-12254=1

若要使您的系統保持在最新狀態,請使用「zypper 修補程式」。

另請參閱

https://bugzilla.suse.com/show_bug.cgi?id=958324

https://helpx.adobe.com/security/products/flash-player/apsb15-32.html

https://www.suse.com/security/cve/CVE-2015-8045/

https://www.suse.com/security/cve/CVE-2015-8047/

https://www.suse.com/security/cve/CVE-2015-8048/

https://www.suse.com/security/cve/CVE-2015-8049/

https://www.suse.com/security/cve/CVE-2015-8050/

https://www.suse.com/security/cve/CVE-2015-8055/

https://www.suse.com/security/cve/CVE-2015-8056/

https://www.suse.com/security/cve/CVE-2015-8057/

https://www.suse.com/security/cve/CVE-2015-8058/

https://www.suse.com/security/cve/CVE-2015-8059/

https://www.suse.com/security/cve/CVE-2015-8060/

https://www.suse.com/security/cve/CVE-2015-8061/

https://www.suse.com/security/cve/CVE-2015-8062/

https://www.suse.com/security/cve/CVE-2015-8063/

https://www.suse.com/security/cve/CVE-2015-8064/

https://www.suse.com/security/cve/CVE-2015-8065/

https://www.suse.com/security/cve/CVE-2015-8066/

https://www.suse.com/security/cve/CVE-2015-8067/

https://www.suse.com/security/cve/CVE-2015-8068/

https://www.suse.com/security/cve/CVE-2015-8069/

https://www.suse.com/security/cve/CVE-2015-8070/

https://www.suse.com/security/cve/CVE-2015-8071/

https://www.suse.com/security/cve/CVE-2015-8401/

https://www.suse.com/security/cve/CVE-2015-8402/

https://www.suse.com/security/cve/CVE-2015-8403/

https://www.suse.com/security/cve/CVE-2015-8404/

https://www.suse.com/security/cve/CVE-2015-8405/

https://www.suse.com/security/cve/CVE-2015-8406/

https://www.suse.com/security/cve/CVE-2015-8407/

https://www.suse.com/security/cve/CVE-2015-8408/

https://www.suse.com/security/cve/CVE-2015-8409/

https://www.suse.com/security/cve/CVE-2015-8410/

https://www.suse.com/security/cve/CVE-2015-8411/

https://www.suse.com/security/cve/CVE-2015-8412/

https://www.suse.com/security/cve/CVE-2015-8413/

https://www.suse.com/security/cve/CVE-2015-8414/

https://www.suse.com/security/cve/CVE-2015-8415/

https://www.suse.com/security/cve/CVE-2015-8416/

https://www.suse.com/security/cve/CVE-2015-8417/

https://www.suse.com/security/cve/CVE-2015-8418/

https://www.suse.com/security/cve/CVE-2015-8419/

https://www.suse.com/security/cve/CVE-2015-8420/

https://www.suse.com/security/cve/CVE-2015-8421/

https://www.suse.com/security/cve/CVE-2015-8422/

https://www.suse.com/security/cve/CVE-2015-8423/

https://www.suse.com/security/cve/CVE-2015-8424/

https://www.suse.com/security/cve/CVE-2015-8425/

https://www.suse.com/security/cve/CVE-2015-8426/

https://www.suse.com/security/cve/CVE-2015-8427/

https://www.suse.com/security/cve/CVE-2015-8428/

https://www.suse.com/security/cve/CVE-2015-8429/

https://www.suse.com/security/cve/CVE-2015-8430/

https://www.suse.com/security/cve/CVE-2015-8431/

https://www.suse.com/security/cve/CVE-2015-8432/

https://www.suse.com/security/cve/CVE-2015-8433/

https://www.suse.com/security/cve/CVE-2015-8434/

https://www.suse.com/security/cve/CVE-2015-8435/

https://www.suse.com/security/cve/CVE-2015-8436/

https://www.suse.com/security/cve/CVE-2015-8437/

https://www.suse.com/security/cve/CVE-2015-8438/

https://www.suse.com/security/cve/CVE-2015-8439/

https://www.suse.com/security/cve/CVE-2015-8440/

https://www.suse.com/security/cve/CVE-2015-8441/

https://www.suse.com/security/cve/CVE-2015-8442/

https://www.suse.com/security/cve/CVE-2015-8443/

https://www.suse.com/security/cve/CVE-2015-8444/

https://www.suse.com/security/cve/CVE-2015-8445/

https://www.suse.com/security/cve/CVE-2015-8446/

https://www.suse.com/security/cve/CVE-2015-8447/

https://www.suse.com/security/cve/CVE-2015-8448/

https://www.suse.com/security/cve/CVE-2015-8449/

https://www.suse.com/security/cve/CVE-2015-8450/

https://www.suse.com/security/cve/CVE-2015-8451/

https://www.suse.com/security/cve/CVE-2015-8452/

https://www.suse.com/security/cve/CVE-2015-8453/

https://www.suse.com/security/cve/CVE-2015-8454/

https://www.suse.com/security/cve/CVE-2015-8455/

http://www.nessus.org/u?3aa385c9

Plugin 詳細資訊

嚴重性: Critical

ID: 87317

檔案名稱: suse_SU-2015-2236-1.nasl

版本: 1.12

類型: local

代理程式: unix

已發布: 2015/12/11

已更新: 2021/1/6

相依性: ssh_get_info.nasl

風險資訊

VPR

風險因素: Critical

分數: 9.4

CVSS v2

風險因素: Critical

基本分數: 10

時間分數: 8.7

媒介: AV:N/AC:L/Au:N/C:C/I:C/A:C

時間媒介: E:H/RL:OF/RC:C

弱點資訊

CPE: p-cpe:/a:novell:suse_linux:flash-player, p-cpe:/a:novell:suse_linux:flash-player-gnome, p-cpe:/a:novell:suse_linux:flash-player-kde4, cpe:/o:novell:suse_linux:11

必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2015/12/9

弱點發布日期: 2015/12/10

參考資訊

CVE: CVE-2015-8045, CVE-2015-8047, CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8060, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8407, CVE-2015-8408, CVE-2015-8409, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8415, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8438, CVE-2015-8439, CVE-2015-8440, CVE-2015-8441, CVE-2015-8442, CVE-2015-8443, CVE-2015-8444, CVE-2015-8445, CVE-2015-8446, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8451, CVE-2015-8452, CVE-2015-8453, CVE-2015-8454, CVE-2015-8455