KLA10574
Multiple vulnerabilities in Adobe Flash Player
Updated: 06/18/2020
Detect date
?
05/12/2015
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to write local files, bypass security restrictions, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Memory corruption, heap overflow, integer overflow, type confusion, use after free and memory leak can be exploited remotely via an unknown vectors;
  2. Race condition can be exploited remotely via vectors related to Internet Explorer;
  3. Unknown vulnerabilities can be exploited remotely via an unknown vectors.
Affected products

Adobe Flash Player versions earlier than 17.0.0.188 for OS X and Windows
Adobe Flash Player ESR versions earlier than 13.0.0.289
Adobe Flash Player versions earlier than 11.2.202.460 for Linux
Adobe AIR runtime, SDK and Compiler versions earlier than 17.0.0.172

Solution

Update to the latest version
Get Flash Player
Get AIR

Original advisories

Adobe bulletin

Impacts
?
ACE 
[?]

OSI 
[?]

SB 
[?]

WLF 
[?]
Related products
Adobe Flash Player ActiveX
Adobe AIR
Adobe Flash Player NPAPI
Adobe Flash Player PPAPI
CVE-IDS
?
CVE-2015-30445.0Critical
CVE-2015-308910.0Critical
CVE-2015-308810.0Critical
CVE-2015-308410.0Critical
CVE-2015-308610.0Critical
CVE-2015-30915.0Critical
CVE-2015-307810.0Critical
CVE-2015-30795.0Critical
CVE-2015-308010.0Critical
CVE-2015-30814.3Warning
CVE-2015-30925.0Critical
CVE-2015-309010.0Critical
CVE-2015-308710.0Critical
CVE-2015-307710.0Critical
CVE-2015-30856.4High
CVE-2015-30836.4High
CVE-2015-30826.4High
CVE-2015-309310.0Critical
Exploitation

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/37845

https://www.exploit-db.com/exploits/37844

https://www.exploit-db.com/exploits/37853

https://www.exploit-db.com/exploits/37842

https://www.exploit-db.com/exploits/37843

https://www.exploit-db.com/exploits/37841

https://www.exploit-db.com/exploits/37840

https://www.exploit-db.com/exploits/37846

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.