-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Reference: CERT-EU Security Advisory 2014-019


Title: Security updates available for Adobe Flash Player
 

Version history:

21.02.2014 Initial publication [1]
 

Summary
=======

Adobe has released security updates for Adobe Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.336 and earlier versions for Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe is aware of reports that an exploit for CVE-2014-0502 exists in the wild, and recommends users update their product installations to the latest versions as soon as possible:

CVE numbers: 

CVE-2014-0498
CVE-2014-0499 
CVE-2014-0502
 

Vulnerable systems
==================


Adobe Flash Player 12.0.0.44 and earlier versions for Windows and Macintosh
Adobe Flash Player 11.2.202.336 and earlier versions for Linux
Adobe AIR 4.0.0.1390 and earlier versions for Android
Adobe AIR 3.9.0.1390 SDK and earlier versions
Adobe AIR 3.9.0.1390 SDK & Compiler and earlier versions

 

What can you do?
================

Adobe recommends users update their software installations by following the instructions listed bellow the SOLUTION tab of the original advisory:[1]

 
What to tell your users?
========================

N/A


More information
================

[1] http://helpx.adobe.com/security/products/flash-player/apsb14-07.html
 

Best regards,

 

CERT-EU Team (http://cert.europa.eu)
Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu
PGP KeyID 0x46AC4383
FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383
Privacy Statement:
http://cert.europa.eu/cert/plainedition/en/cert_privacy.html

 


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=cFe9
-----END PGP SIGNATURE-----