Adobe released a Security update for Adobe Flash Player on June 23, 2015 to cover a critical 0day Heap-based buffer overflow vulnerability.
Dell SonicWALL has released the following signature to protect their customers at the same day:
"1040 Malformed-File swf.MP.228"
There was no further activities addressing this vulnerability has been observed as of today since the signature was deployed on Dell SonicWALL GRID system.
However, exploiting this vulnerability could potentially allow an attacker to take control of the affected system, which include systems running Internet Explorer for Windows 7 and below, as well as Firefox on Windows XP. An update of the Adobe Flash Player application is suggested. The following are the list of affected software versions:
This vulnerability is referred by CVE as CVE-2015-3113.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3113
Have a good time.
(Be knowledgeable, pass it on then)
Dell SonicWALL has released the following signature to protect their customers at the same day:
"1040 Malformed-File swf.MP.228"
There was no further activities addressing this vulnerability has been observed as of today since the signature was deployed on Dell SonicWALL GRID system.
However, exploiting this vulnerability could potentially allow an attacker to take control of the affected system, which include systems running Internet Explorer for Windows 7 and below, as well as Firefox on Windows XP. An update of the Adobe Flash Player application is suggested. The following are the list of affected software versions:
- Adobe Flash Player 18.0.0.161 and earlier versions for Windows and Macintosh
- Adobe Flash Player Extended Support Release version 13.0.0.292 and earlier 13.x versions for Windows and Macintosh
- Adobe Flash Player 11.2.202.466 and earlier 11.x versions for Linux
This vulnerability is referred by CVE as CVE-2015-3113.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3113
Have a good time.
(Be knowledgeable, pass it on then)
Comments
Post a Comment