SUSE SLED12 安全性更新:flash-player (SUSE-SU-2016:1305-1)

critical Nessus Plugin ID 91217

概要

遠端 SUSE 主機缺少一個或多個安全性更新。

說明

此 flash-player 更新可修正下列問題:

- 11.2.202.621 的安全性更新 (bsc#979422):

- APSA16-02、APSB16-15、CVE-2016-1096、CVE-2016-1097、CVE-2016-1098、CVE-2016-1099、CVE-2016-1100、CVE-2016-1101、CVE-2016-1102、CVE-2016-1103、CVE-2016-1104、CVE-2016-1105、CVE-2016-1106、CVE-2016-1107、CVE-2016-1108、CVE-2016-1109、CVE-2016-1110、CVE-2016-4108、CVE-2016-4109、CVE-2016-4110、CVE-2016-4111、CVE-2016-4112、CVE-2016-4113、CVE-2016-4114、CVE-2016-4115、CVE-2016-4116、CVE-2016-4117

- 下列 CVE 已在前版中修正,但後來才發佈:

- APSA16-01、APSB16-10、CVE-2016-1006、CVE-2016-1011、CVE-2016-1012、CVE-2016-1013、CVE-2016-1014、CVE-2016-1015、CVE-2016-1016、CVE-2016-1017、CVE-2016-1018、CVE-2016-1019、CVE-2016-1020、CVE-2016-1021、CVE-2016-1022、CVE-2016-1023、CVE-2016-1024、CVE-2016-1025、CVE-2016-1026、CVE-2016-1027、CVE-2016-1028、CVE-2016-1029、CVE-2016-1030、CVE-2016-1031、CVE-2016-1032、CVE-2016-1033

請注意,Tenable Network Security 已直接從 SUSE 安全性公告擷取前置描述區塊。Tenable 已盡量在不造成其他問題的前提下,嘗試自動清理並將其格式化。

解決方案

若要安裝此 SUSE 安全性更新,請使用 YaST online_update。
或者,也可以執行針對您的產品所列的命令:

SUSE Linux Enterprise Workstation Extension 12-SP1:

zypper in -t patch SUSE-SLE-WE-12-SP1-2016-772=1

SUSE Linux Enterprise Workstation Extension 12:

zypper in -t patch SUSE-SLE-WE-12-2016-772=1

SUSE Linux Enterprise Desktop 12-SP1:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-772=1

SUSE Linux Enterprise Desktop 12:

zypper in -t patch SUSE-SLE-DESKTOP-12-2016-772=1

若要使您的系統保持在最新狀態,請使用「zypper 修補程式」。

另請參閱

https://bugzilla.suse.com/show_bug.cgi?id=979422

https://www.suse.com/security/cve/CVE-2016-1006/

https://www.suse.com/security/cve/CVE-2016-1097/

https://www.suse.com/security/cve/CVE-2016-1098/

https://www.suse.com/security/cve/CVE-2016-1099/

https://www.suse.com/security/cve/CVE-2016-1100/

https://www.suse.com/security/cve/CVE-2016-1101/

https://www.suse.com/security/cve/CVE-2016-1102/

https://www.suse.com/security/cve/CVE-2016-1103/

https://www.suse.com/security/cve/CVE-2016-1104/

https://www.suse.com/security/cve/CVE-2016-1105/

https://www.suse.com/security/cve/CVE-2016-1106/

https://www.suse.com/security/cve/CVE-2016-1107/

https://www.suse.com/security/cve/CVE-2016-1108/

https://www.suse.com/security/cve/CVE-2016-1109/

https://www.suse.com/security/cve/CVE-2016-1110/

https://www.suse.com/security/cve/CVE-2016-4108/

https://www.suse.com/security/cve/CVE-2016-4109/

https://www.suse.com/security/cve/CVE-2016-4110/

https://www.suse.com/security/cve/CVE-2016-4111/

https://www.suse.com/security/cve/CVE-2016-4112/

https://www.suse.com/security/cve/CVE-2016-4113/

https://www.suse.com/security/cve/CVE-2016-4114/

https://www.suse.com/security/cve/CVE-2016-4115/

https://www.suse.com/security/cve/CVE-2016-1011/

https://www.suse.com/security/cve/CVE-2016-1012/

https://www.suse.com/security/cve/CVE-2016-1013/

https://www.suse.com/security/cve/CVE-2016-1014/

https://www.suse.com/security/cve/CVE-2016-1015/

https://www.suse.com/security/cve/CVE-2016-1016/

https://www.suse.com/security/cve/CVE-2016-1017/

https://www.suse.com/security/cve/CVE-2016-1018/

https://www.suse.com/security/cve/CVE-2016-1019/

https://www.suse.com/security/cve/CVE-2016-1020/

https://www.suse.com/security/cve/CVE-2016-1021/

https://www.suse.com/security/cve/CVE-2016-1022/

https://www.suse.com/security/cve/CVE-2016-1023/

https://www.suse.com/security/cve/CVE-2016-1024/

https://www.suse.com/security/cve/CVE-2016-1025/

https://www.suse.com/security/cve/CVE-2016-1026/

https://www.suse.com/security/cve/CVE-2016-1027/

https://www.suse.com/security/cve/CVE-2016-1028/

https://www.suse.com/security/cve/CVE-2016-1029/

https://www.suse.com/security/cve/CVE-2016-1030/

https://www.suse.com/security/cve/CVE-2016-1031/

https://www.suse.com/security/cve/CVE-2016-1032/

https://www.suse.com/security/cve/CVE-2016-1033/

https://www.suse.com/security/cve/CVE-2016-1096/

https://www.suse.com/security/cve/CVE-2016-4116/

https://www.suse.com/security/cve/CVE-2016-4117/

http://www.nessus.org/u?e82b824a

Plugin 詳細資訊

嚴重性: Critical

ID: 91217

檔案名稱: suse_SU-2016-1305-1.nasl

版本: 2.16

類型: local

代理程式: unix

已發布: 2016/5/18

已更新: 2022/3/8

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: Critical

分數: 9.6

CVSS v2

風險因素: Critical

基本分數: 10

時間分數: 8.7

媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

風險因素: Critical

基本分數: 9.8

時間分數: 9.4

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:H/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:novell:suse_linux:flash-player, p-cpe:/a:novell:suse_linux:flash-player-gnome, cpe:/o:novell:suse_linux:12

必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2016/5/16

弱點發布日期: 2016/4/7

CISA 已知遭惡意利用弱點到期日: 2022/3/24

可惡意利用

Metasploit (Adobe Flash Player DeleteRangeTimelineOperation Type-Confusion)

參考資訊

CVE: CVE-2016-1006, CVE-2016-1011, CVE-2016-1012, CVE-2016-1013, CVE-2016-1014, CVE-2016-1015, CVE-2016-1016, CVE-2016-1017, CVE-2016-1018, CVE-2016-1019, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1030, CVE-2016-1031, CVE-2016-1032, CVE-2016-1033, CVE-2016-1096, CVE-2016-1097, CVE-2016-1098, CVE-2016-1099, CVE-2016-1100, CVE-2016-1101, CVE-2016-1102, CVE-2016-1103, CVE-2016-1104, CVE-2016-1105, CVE-2016-1106, CVE-2016-1107, CVE-2016-1108, CVE-2016-1109, CVE-2016-1110, CVE-2016-4108, CVE-2016-4109, CVE-2016-4110, CVE-2016-4111, CVE-2016-4112, CVE-2016-4113, CVE-2016-4114, CVE-2016-4115, CVE-2016-4116, CVE-2016-4117