navigation bar left navigation bar right

Secunia CSI7
navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Adobe Flash Player 10.x

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Programs

Relating to this vendor:
Adobe Systems
And, this specific program:
Adobe Flash Player 10.x

This thread has been marked as resolved.
JAV Adobe Flash Player 10.x
Member 22nd Jul, 2010 02:04
Ranking: 0
Posts: 13
User Since: 23rd Jun, 2009
System Score: N/A
Location: N/A
PSI says above is insecure. I've tried all forum solutions posted on this subject to date to either delete it (won't work--it's read-only for some reason) patch or update--nothing works. External hard drive Path is: F:\WINDOWS\system32\Macromed\Flash\Flash.10a.ocx WXP SP3 IE8 Does anyone have any suggestions for a solution? I've never had this much trouble curing an insecure program detected by PSI. I've rescanned and rebooted after trying each of the various solutions posted in this forum. Thanks. JAV

Post "RE: Adobe Flash Player 10.x" has been selected as an answer.
wr RE: Adobe Flash Player 10.x
Contributor 22nd Jul, 2010 05:47
Score: 308
Posts: 739
User Since: 30th Mar 2008
System Score: 100%
Location: US
Hi JAV

I see that the file path leads to your F: drive. The
Flash 10a.ocx is the vulnerability being reported on by
the PSI. I presume this a backup/reinstallation for your
OS. If so then creating a Ignore Rule for that drive
will stop the 'nag' from the PSI.

1.Click on CREATE IGNORE RULE

2.In the RULE NAME BOX insert something like MY BACKUP DRIVE (MY PARTITION DRIVE)

3.In the RULE BOX type F:\(or the drive letter you wish to ignore) - For folder i386 use C:\Windows\i386.

4.Click SAVE IGNORE RULE>CLOSE

All drives will continue to be scanned by default but the result from the ignored list will not be published.

Hope this helps.

Regards, wr

--
HP Pavilion Slimline s3020n
Windows Vista Home Premium SP2 32 bit
AMD 64 Athlon X2
Firefox 31.3.0 ESR
The weakest link of a computer system is always sitting in front of the monitor.
Was this reply relevant?
+1
-0
JAV10 RE: Adobe Flash Player 10.x
Member 22nd Jul, 2010 17:55
Score: 0
Posts: 3
User Since: 22nd Jul 2010
System Score: N/A
Location: US
on 22nd Jul, 2010 05:47, wr wrote:
Hi JAV

I see that the file path leads to your F: drive. The
Flash 10a.ocx is the vulnerability being reported on by
the PSI. I presume this a backup/reinstallation for your
OS. If so then creating a Ignore Rule for that drive
will stop the 'nag' from the PSI.

1.Click on CREATE IGNORE RULE

2.In the RULE NAME BOX insert something like MY BACKUP DRIVE (MY PARTITION DRIVE)

3.In the RULE BOX type F:\(or the drive letter you wish to ignore) - For folder i386 use C:\Windows\i386.

4.Click SAVE IGNORE RULE>CLOSE

All drives will continue to be scanned by default but the result from the ignored list will not be published.

Hope this helps.

Regards, wr



--
JAV
Was this reply relevant?
+0
-0
JAV10 RE: Adobe Flash Player 10.x
Member 22nd Jul, 2010 18:09
Score: 0
Posts: 3
User Since: 22nd Jul 2010
System Score: N/A
Location: US
Hello wr, Thank you for your help. I followed you suggestions, rescanned PSI and came up with my normal 100% secure rating. Questions: (1) By using the ignore option will I be vulnerable to hacking as the program is still on my F (external) hard drive? (2) I couldn't find your referral to "For folder i386 use C:\Windows\i386." Am I missing something important? Thanks again. JAV10

--
JAV
Was this reply relevant?
+0
-0
wr RE: Adobe Flash Player 10.x
Contributor 22nd Jul, 2010 19:31
Score: 308
Posts: 739
User Since: 30th Mar 2008
System Score: 100%
Location: US
Hi, you're welcome & glad all is well now.
To answer your questions 1. If the programs on your F: drive
aren't accessible to you then they're not to the
'bad guys' either. I mean by this that your F: drive is
solely for backup/reinstallation. 2. The i386 folder is a partition 'created' by some comp companies for backup/reinstallation
whereas some 'create' a D: or similar named partitioni.e. my HP has a D:\ drive where the backup\reinstallation programs
are located but maybe on a DELL or other brand this might
be named i386:-so no you didn't miss anything.

If this has solved your problem would you please
press the ACCEPT button to prevent you & I from
receiving unnecessary update emails.

Regards, wr

--
HP Pavilion Slimline s3020n
Windows Vista Home Premium SP2 32 bit
AMD 64 Athlon X2
Firefox 31.3.0 ESR
The weakest link of a computer system is always sitting in front of the monitor.
Was this reply relevant?
+4
-0
JAV10 RE: Adobe Flash Player 10.x
Member 22nd Jul, 2010 19:41
Score: 0
Posts: 3
User Since: 22nd Jul 2010
System Score: N/A
Location: US
Thanks wr,

I think I've got it. I looked for the ACCEPT button but couldn't find it. I clicked on "relevant" for your reply, maybe that will do it. Sorry but I'm new to this.

Regards, JAV

--
JAV
Was this reply relevant?
+0
-0
wr RE: Adobe Flash Player 10.x
Contributor 22nd Jul, 2010 20:03
Score: 308
Posts: 739
User Since: 30th Mar 2008
System Score: 100%
Location: US
Last edited on 22nd Jul, 2010 20:06
The ACCEPT button is only revealed to the
Original Poster-in this case JAV not JAV10
even though you are possibly the same person i.e. you
must use the Profile of JAV to access the Forum to do this.

Regards, wr

--
HP Pavilion Slimline s3020n
Windows Vista Home Premium SP2 32 bit
AMD 64 Athlon X2
Firefox 31.3.0 ESR
The weakest link of a computer system is always sitting in front of the monitor.
Was this reply relevant?
+0
-0

This thread has been marked as locked.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+