VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : 脆弱性脅威分析用情報の定型データ配信
[ about VRDA Feed | JPCERT/CC



 
分析対象脆弱性情報 (リビジョン番号 : 1) [ Download XML
VRDA-090723-001     ( JVNVU#259425 )
Adobe Flash Player vulnerability
http://www.kb.cert.org/vuls/id/259425

Adobe Flash contains a vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.




この情報について
分析情報提供元:
JPCERT/CC
初版公開日:
2009-07-23
分析対象脆弱性情報の分類:
アドバイザリ・注意喚起
最終更新日:
2009-07-23




脆弱性の影響を受ける製品の識別子
cpe:/a:adobe:acrobat     (Adobe Acrobat)
cpe:/a:adobe:acrobat_reader     (Adobe Acrobat Reader)
cpe:/a:adobe:flash_player     (Adobe Flash Player)
 


脆弱性の分析内容
[分析に利用した情報の信頼性] [?]
 [?]

 [?]
X [?]

[影響の大きさ] [?]
 [?]

小~中 [?]
中~大 [?]
X [?]

[攻撃経路] [?]
物理アクセス [?]

ローカルマシン上 [?]
同一セグメント上 [?]
X インターネット経由 [?]

[認証レベル] [?]
管理者アカウント [?]

一般ユーザアカウント [?]
フリーアカウント [?]
X 不要 [?]

[攻撃成立に必要なユーザの関与] [?]
複雑 [?]

X 簡単 [?]
不要 [?]

[攻撃の難易度] [?]
 [?]

中~高 [?]
低~中 [?]
 [?]

[対策の有無] [?]
公式パッチ有り [?]

公式回避策有り [?]
X 非公式回避策・パッチ有り [?]
なし [?]

[インシデントの発生状況] [?]
活動なし [?]

Exploit/PoCあり [?]
X 活動あり [?]

関連情報
JVN JVNVU#259425 Adobe Flash Player に脆弱性
Adobe Flash Player には任意のコードが実行可能な脆弱性が存在します。








参考情報
Adobe Product Security Incident Response Team (PSIRT) Potential Adobe Reader, Acrobat, and Flash Player issue
Adobe is aware of reports of a potential vulnerability in Adobe Reader and Acrobat 9.1.2 and Adobe Flash Player 9 and 10. We are currently investigating this potential issue and will have an update once we get more information.




Symantec Connect Next-Generation Flash Vulnerability
Recently we came into possession of an Adobe Acrobat PDF file that upon opening drops and executes a malicious binary. It was quite clear that this PDF was exploiting some vulnerability in order to drop its payload. And, during the analysis it soon became apparent that this vulnerability was not one we had seen in the wild before. What was even more surprising was that this vulnerability affects Adobe Flash—not Adobe Reader as we initially suspected.





Copyright © 2009 JPCERT/CC All Rights Reserved.