Gentoo Logo

Adobe Flash Player: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201001-02 / adobe-flash
Release Date January 03, 2010
Latest Revision January 03, 2010: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-plugins/adobe-flash < >= All supported architectures

Related bugreports: #296407


Multiple vulnerabilities in Adobe Flash Player might allow remote attackers to execute arbitrary code or cause a Denial of Service.

2.  Impact Information


The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites.


Multiple vulnerabilities have been discovered in Adobe Flash Player:

  • An anonymous researcher working with the Zero Day Initiative reported that Adobe Flash Player does not properly process JPEG files (CVE-2009-3794).
  • Jim Cheng of EffectiveUI reported an unspecified data injection vulnerability (CVE-2009-3796).
  • Bing Liu of Fortinet's FortiGuard Labs reported multiple unspecified memory corruption vulnerabilities (CVE-2009-3797, CVE-2009-3798).
  • Damian Put reported an integer overflow in the Verifier::parseExceptionHandlers() function (CVE-2009-3799).
  • Will Dormann of CERT reported multiple unspecified Denial of Service vulnerabilities (CVE-2009-3800).


A remote attacker could entice a user to open a specially crafted SWF file, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application, or a Denial of Service via unknown vectors.

3.  Resolution Information


There is no known workaround at this time.


All Adobe Flash Player users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-"

4.  References


Page updated January 03, 2010

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.