Adobe Flash Player 11.1.102.62 for Windows Macintosh Linux and Solaris

Adobe Flash Player 11.1.102.62 for Windows Macintosh Linux and Solaris

This update resolves:

  • a memory corruption vulnerability that could lead to code execution (Windows ActiveX control only) (CVE-2012-0751)
  • a type confusion memory corruption vulnerability that could lead to code execution (CVE-2012-0752)
  • an MP4 parsing memory corruption vulnerability that could lead to code execution (CVE-2012-0753)
  • a memory corruption vulnerability that could lead to code execution (CVE-2012-0754)
  • a security bypass vulnerability that could lead to code execution (CVE-2012-0755)
  • a security bypass vulnerability that could lead to code execution (CVE-2012-0756)
  • a universal cross-site scripting vulnerability that could be used to take actions on a user’s behalf on any website or webmail provider, if the user visits a malicious website (CVE-2012-0767)

Adobe Flash Player 11.1.111.6 for Android 2.x and 3.x

Adobe Flash Player 11.1.111.6 for Android 2.x and 3.x

This update resolves:

  • a memory corruption vulnerability that could lead to code execution (Windows ActiveX control only) (CVE-2012-0751)
  • a type confusion memory corruption vulnerability that could lead to code execution (CVE-2012-0752)
  • an MP4 parsing memory corruption vulnerability that could lead to code execution (CVE-2012-0753)
  • a memory corruption vulnerability that could lead to code execution (CVE-2012-0754)
  • a security bypass vulnerability that could lead to code execution (CVE-2012-0755)
  • a security bypass vulnerability that could lead to code execution (CVE-2012-0756)
  • a universal cross-site scripting vulnerability that could be used to take actions on a user’s behalf on any website or webmail provider, if the user visits a malicious website (CVE-2012-0767)

Adobe Flash Player 11.1.115.6 for Android 4.x

Adobe Flash Player 11.1.115.6 for Android 4.x

This update resolves:

  • a memory corruption vulnerability that could lead to code execution (Windows ActiveX control only) (CVE-2012-0751)
  • a type confusion memory corruption vulnerability that could lead to code execution (CVE-2012-0752)
  • an MP4 parsing memory corruption vulnerability that could lead to code execution (CVE-2012-0753)
  • a memory corruption vulnerability that could lead to code execution (CVE-2012-0754)
  • a security bypass vulnerability that could lead to code execution (CVE-2012-0755)
  • a security bypass vulnerability that could lead to code execution (CVE-2012-0756)
  • a universal cross-site scripting vulnerability that could be used to take actions on a user’s behalf on any website or webmail provider, if the user visits a malicious website (CVE-2012-0767)

Watchguard XTM 2 Series, XTM 3 Series, XTM 5 Series, XTM 8 Series – Fireware XTM OS 11.5.1 – CSP4 Build # 335367

Watchguard XTM 2 Series, XTM 3 Series, XTM 5 Series, XTM 8 Series – Fireware XTM OS 11.5.1 – CSP4 Build # 335367

11.5.1 – CSP4 Build # 335367 Resolves the following issues:

BUG64669: Resolved a Firebox crash and reboot when using FireCluster.

BUG63793: Improved proxy debug logging when using FireCluster.

BUG63574: Proxy connections fail with logs showing: “failed to create new traffic spec” and “insert_tspec:XX index inuse?

BUG65026: Iked stack trace eip=0x080c4013 caused by Mobile VPN with IPSec connection.

BUG63860: snmpd memory leak

You can request 11.5.1 – CSP4 Build # 335367 from Watchguard Support by logging a support case online, they should then be able to provide an ftp download link and appropriate credentials.

Please note that Watchguard CSP releases are cumulative so you should only need to apply the latest to ensure that you also have any previous fixes.

IT – Software and Hardware Support Resources