A Network Security Emergency User
Defined Signature (UDS) has been created to detect the following threats:
- UDS-HTTP: Adobe
Flash Player Out of bound write due to a mp4 file missing a track
(CVE-2015-0332)
- UDS-HTTP: Adobe
Flash Player Memory corruption due to missing constructor type check in
XMLNode Class (CVE-2015-0334)
- UDS-HTTP: Adobe
Flash Player Memory corruption while parsing mp4 with excessive trex tags
(CVE-2015-0335)
- UDS-HTTP: Adobe
Flash Player Type Confusion in NetConnection ASNative (CVE-2015-0336)
- UDS-HTTP: Adobe
Flash Player Cross Domain Policy Bypass via File Upload and Redirection
(CVE-2015-0337)
- UDS-HTTP: Adobe
Flash Player Integer Overflow in paletteMap (CVE-2015-0338)
- UDS-HTTP: Adobe
Flash Player Memory corruption in PCRE while parsing recursvie calls to
possessively repeated groups (CVE-2015-0339)
- UDS-HTTP: Adobe
Flash Player file upload restriction bypass (CVE-2015-0340)
- UDS-HTTP: Adobe
Flash Player Use after free in handling nested AVStream and AVSource
objects (CVE-2015-0341)
- UDS-HTTP: Adobe
Flash Player Use after free in display list handling (CVE-2015-0342)
The UDS and its release notes are
available for download via the Knowledge Base article KB55447.
Please read the release notes
carefully for important information.
No comments:
Post a Comment