Changes
Cleanup
Note: This probably also works for older versions of Flash (<9), but I believe the mms.cfg file then has to be copied to the Windows\system32 directory?
== Adobe Flash Player security settings for "Clickjacking" vulnerability (APSA08-08) == Waiting for the next version of Flash Player to be available, you are strongly encouraged to apply the following settings for security reasons: http://www.adobe.com/support/security/advisories/apsa08-08.html. According to bulletin and to the "Adobe Flash Player Administration Guide" (you find the link in the same security bulletin): * create a file named "mms.cfg"* write in this file the lines containing the "ParameterName = ParameterValue" pairs you need, "AVHardwareDisable = 1" in this APSA08-08 case* deploy it with the following WPKG package <source lang="xml"><package id="flash-settings" name="Adobe Flash Player settings for APSA08-08 vulnerability" revision="1" reboot="false" priority="0" execute="once"> <install cmd='%COMSPEC% /c copy /Y "%SOFTWARE%\Flash\settings\mms.cfg " "%WINDIR%\system32\Macromed\Flash\" ' /></package></source> Or you could just integrate this line with the installation packages above, if you do not want to keep it as a separate package. == Older versions == === Adobe Flash Player 9.0.124.0 for Firefox ===
You are encouraged to upgrade for security reasons: http://www.adobe.com/support/security/bulletins/apsb08-11.html and then to apply the security settings for "Clickjacking" vulnerability (APSA08-08) defined below.
</source>
=== Adobe Flash Player 9.0.124.0 for Internet Explorer ===
You are encouraged to upgrade for security reasons: http://www.adobe.com/support/security/bulletins/apsb08-11.html and then to apply the security settings for "Clickjacking" vulnerability (APSA08-08) defined below.
</source>
== Adobe Flash Player security settings for "Clickjacking" vulnerability (APSA08-08) == Waiting for the next version of Flash Player to be available, you are strongly encouraged to apply the following settings for security reasons: http://www.adobe.com/support/security/advisories/apsa08-08.html. According to bulletin and to the "Adobe Flash Player Administration Guide" (you find the link in the same security bulletin): * create a file named "mms.cfg"* write in this file the lines containing the "ParameterName = ParameterValue" pairs you need, "AVHardwareDisable = 1" in this APSA08-08 case* deploy it with the following WPKG package <source lang="xml"><package id="flash-settings" name="Adobe Flash Player settings for APSA08-08 vulnerability" revision="1" reboot="false" priority="0" execute="once"> <install cmd='%COMSPEC% /c copy /Y "%SOFTWARE%\Flash\settings\mms.cfg " "%WINDIR%\system32\Macromed\Flash\" ' /></package></source> Or you could just integrate this line with the installation packages above, if you do not want to keep it as a separate package. == Adobe Flash Player 9.0.115.0 for Firefox ===
Installer packaged as an executable, installs as a plugin.
</source>
=== Adobe Flash Player 9.0.115.0 for Internet Explorer ===
Installer packaged as .msi, installs as an ActiveX. The line "Adobe Flash Player 9 ActiveX" in Control Panel's Add/Remove Programs doesn't show any minor version, so both this line and the detailed ocx's file version have to be checked with a logical and condition.
</source>
=== Adobe Flash Player 9.0.47.0 for Firefox ===
Installer packaged as an executable, installs as a plugin. Didn't test if the uninstall_plugin.exe in the remove line removes both this and Internet Explorer Flash Player ActiveX.
</source>
=== Adobe Flash Player 9.0.47.0 for Internet Explorer ===
Installer packaged as .msi, installs as an ActiveX. The line "Adobe Flash Player 9 ActiveX" in Control Panel's Add/Remove Programs doesn't show any minor version, so both this line and the detailed ocx's file version have to be checked with a logical and condition.
</source>
[[category:Silent Installers]]
[[category:Security Advisories]]