[Please update if you use Flash plugin on any browser -- Raju]

03-03 Security Patch for Macromedia Flash Player
Originally posted: March 3, 2003
Last updated: March 5, 2003

Summary

Macromedia is committed to the security of Macromedia Flash Player,
and invests considerable ongoing effort to ensure that we protect the
security and privacy of all Macromedia Flash Player users and all
websites serving Macromedia Flash content.

To ensure that the code we write and the software we release is as
secure as possible, we have enhanced our testing practices, worked
with third parties to evaluate our software architecture, and tested
our software with detailed penetration tests. We hire and welcome
third parties from the security field to help us deliver the most
secure software possible.

Macromedia is dedicated to protecting the security and privacy of its
customers. This is a long-term effort for Macromedia across all
products. As part of that commitment, Macromedia recently appointed
Paul Madar as its chief product security officer. Madar will work
within the company, our developer community, and the security field to
bring a relentless focus on this initiative. Madar runs product
development for servers and recently ran product development for all
Macromedia products.

Recently, Macromedia became aware of potential security issues with
Macromedia Flash Player. A new version of Macromedia Flash Player
fixes these issues to protect our users from any content that attempts
to execute this type of malicious code.

Severity Rating

Macromedia categorizes this issue as a critical update and recommends
users immediately update to the newest player.

Issue

Monday Macromedia issued a new version of the Macromedia Flash
Player. As part of the Macromedia Flash Player, we?ve also included a
Cumulative Security Patch which addresses previously fixed buffer
overrun issues and also potential security issues with domain name
spoofing.

The cumulative security patch is available today and addresses the
potential for exploits surrounding buffer overflows (read/write) and
sandbox integrity within the player, which might allow malicious users
to gain access to a user?s computer. The possibility of running native
code on a users machine is a theoretical exploit, and extremely
difficult to execute in practice. There are no known examples of
running such native code from Macromedia Flash movies; however, even
though this issue is difficult and theoretical in nature only, we are
encouraging users to upgrade.

Solution

Macromedia has released a cumulative security patch for Macromedia
Flash Player (6,0,79,0), which you can download on the Macromedia
Player Download Center.

Revisions

March 5, 2003 - Bulletin first released.

Reporting Security Issues

Macromedia is committed to addressing security issues and providing
customers with the information on how they can protect themselves. If
you identify what you believe may be a security issue with a
Macromedia product, please send an email to [EMAIL PROTECTED] We
will work to appropriately address and communicate the issue.

Receiving Security Bulletins

When Macromedia becomes aware of a security issue that we believe
significantly affects our products or customers, we will notify
customers when appropriate. Typically this notification will be in the
form of a security bulletin explaining the issue and the
response. Macromedia customers who would like to receive notification
of new security bulletins when they are released can sign up for our
security notification service.

For additional information on security issues at Macromedia, please
visit: http://www.macromedia.com/security.

ANY INFORMATION, PATCHES, DOWNLOADS, WORKAROUNDS OR FIXES PROVIDED BY
MACROMEDIA IN THIS BULLETIN ARE PROVIDED "AS IS" WITHOUT WARRANTY OF
ANY KIND. MACROMEDIA AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES,
WHETHER EXPRESS OR IMPLIED OR OTHERWISE, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ALSO, THERE IS
NO WARRANTY OF NON-INFRINGEMENT, TITLE OR QUIET ENJOYMENT. (USA ONLY)
SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO THE
ABOVE EXCLUSION MAY NOT APPLY TO YOU.

IN NO EVENT SHALL MACROMEDIA, INC. OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES 
WHATSOEVER INCLUDING, WITHOUT LIMITATION, DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, 
SPECIAL, PUNITIVE, COVER, LOSS OF PROFITS, BUSINESS INTERRUPTION OR THE LIKE, OR LOSS 
OF BUSINESS DAMAGES, BASED ON ANY THEORY OF LIABILITY INCLUDING BREACH OF CONTRACT, 
BREACH OF WARRANTY, TORT(INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN 
IF MACROMEDIA, INC. OR ITS SUPPLIERS OR THEIR REPRESENTATIVES HAVE BEEN ADVISED OF THE 
POSSIBILITY OF SUCH DAMAGES. (USA ONLY) SOME STATES DO NOT ALLOW THE EXCLUSION OR 
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE ABOVE 
EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU AND YOU MAY ALSO HAVE OTHER LEGAL RIGHTS 
THAT VARY FROM STATE TO STATE.

Macromedia reserves the right, from time to time, to update the information in this 
document with current information.



-- 
Raj Mathur                [EMAIL PROTECTED]      http://kandalaya.org/
                      It is the mind that moves

          ================================================
To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject header. 
Check archives at http://www.mail-archive.com/ilugd%40wpaa.org

Reply via email to