KLA10650
Multiple vulnerabilities in Adobe products
Updated: 06/18/2020
Detect date
?
08/11/2015
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to cause denial of service or execute arbitrary code.

Below is a complete list of vulnerabilities

  1. Type confusion, use-after-free, multiple overflows and memory corruption could be exploited remotely via an unknown vectors to cause denial of service or execute arbitrary code;
  2. Lack of restrictions introduced at previous version can be exploited remotely via an unknown vectors to cause denial of service or execute arbitrary code.
Affected products

Adobe Flash Player for Windows and OS X versions earlier than 18.0.0.232
Adobe Flash Player ESR versions earlier than 18.0.0.232
Adobe Flash Player for Linux versions earlier than 11.2.202.508
Adobe flash player at Google Chrome for Linux and Chrome OS versions earlier than 18.0.0.233
Adobe AIR versions earlier than 18.0.0.199

Solution

Update to the latest version
Get Flash Player
Get AIR

Original advisories

Adobe Security bulletin

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]
Related products
Adobe Flash Player ActiveX
Adobe AIR
Adobe Flash Player NPAPI
Adobe Flash Player PPAPI
CVE-IDS
?
CVE-2015-512410.0Critical
CVE-2015-554410.0Critical
CVE-2015-554510.0Critical
CVE-2015-554010.0Critical
CVE-2015-554110.0Critical
CVE-2015-554810.0Critical
CVE-2015-554910.0Critical
CVE-2015-554610.0Critical
CVE-2015-554710.0Critical
CVE-2015-553910.0Critical
CVE-2015-556110.0Critical
CVE-2015-556510.0Critical
CVE-2015-556410.0Critical
CVE-2015-556310.0Critical
CVE-2015-556210.0Critical
CVE-2015-555510.0Critical
CVE-2015-556610.0Critical
CVE-2015-512510.0Critical
CVE-2015-512710.0Critical
CVE-2015-512910.0Critical
CVE-2015-556010.0Critical
CVE-2015-513010.0Critical
CVE-2015-513110.0Critical
CVE-2015-555110.0Critical
CVE-2015-555010.0Critical
CVE-2015-555710.0Critical
CVE-2015-555610.0Critical
CVE-2015-555910.0Critical
CVE-2015-555810.0Critical
CVE-2015-555310.0Critical
CVE-2015-555210.0Critical
CVE-2015-513410.0Critical
CVE-2015-555410.0Critical
CVE-2015-513310.0Critical
CVE-2015-513210.0Critical
Exploitation

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/37859

https://www.exploit-db.com/exploits/37855

https://www.exploit-db.com/exploits/37861

https://www.exploit-db.com/exploits/37854

https://www.exploit-db.com/exploits/37856

https://www.exploit-db.com/exploits/37852

https://www.exploit-db.com/exploits/37858

https://www.exploit-db.com/exploits/37857

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.