KLA10711
Multiple vulnerabilities in Adobe Flash Player
Updated: 06/17/2019
Detect date
?
12/08/2015
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions or execute arbitrary code.

Below is a complete list of vulnerabilities

  1. An unknown vulnerability can be exploited remotely to cause denial of service;
  2. Use-after-free, stack based buffer overflow and buffer overflow can be exploited remotely to execute arbitrary code;
  3. An unknown vulnerability can be exploited remotely to bypass security restrictions;
  4. Heap-based buffer overflow can be exploited remotely via a specially designed XML to execute arbitrary code;
  5. Improper SharedObject implementation can be exploited remotely to execute arbitrary code;
  6. Integer overflow at Shader filter can be exploited remotely via a specially designed BitmapData object to execute arbitrary code.

Technical details

Vulnerability (4) related to toString call.

Vulnerability (5) can be triggered via leveraging type confusion during getRemote call.

Vulnerability (6) can be exploited via large BitmapData.
To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel

Affected products

Adobe Flash Player versions earlier than 20.0.0.228
Adobe Flash Player ESR versions earlier than 18.0.0.268
Adobe Flash Player for Linux versions earlier than 11.2.202.554
Adobe AIR versions earlier than 20.0.0.204

Solution

Update to the latest version
Get Flash
Get AIR

Original advisories

Adobe bulletin

Impacts
?
ACE 
[?]

DoS 
[?]

SB 
[?]
Related products
Adobe Flash Player ActiveX
Adobe AIR
Adobe Flash Player NPAPI
Adobe Flash Player PPAPI
CVE-IDS
?
CVE-2015-80509.3Critical
CVE-2015-84429.3Critical
CVE-2015-806410.0Critical
CVE-2015-806510.0Critical
CVE-2015-806910.0Critical
CVE-2015-806810.0Critical
CVE-2015-806710.0Critical
CVE-2015-806610.0Critical
CVE-2015-840210.0Critical
CVE-2015-840110.0Critical
CVE-2015-807110.0Critical
CVE-2015-807010.0Critical
CVE-2015-840410.0Critical
CVE-2015-840310.0Critical
CVE-2015-804710.0Critical
CVE-2015-804510.0Critical
CVE-2015-80499.3Critical
CVE-2015-804810.0Critical
CVE-2015-844310.0Critical
CVE-2015-844410.0Critical
CVE-2015-842810.0Critical
CVE-2015-84399.3Critical
CVE-2015-844010.0Critical
CVE-2015-844110.0Critical
CVE-2015-84569.3Critical
CVE-2015-843510.0Critical
CVE-2015-84369.3Critical
CVE-2015-84379.3Critical
CVE-2015-84389.3Critical
CVE-2015-843110.0Critical
CVE-2015-842410.0Critical
CVE-2015-842310.0Critical
CVE-2015-842010.0Critical
CVE-2015-841910.0Critical
CVE-2015-842210.0Critical
CVE-2015-842110.0Critical
CVE-2015-841610.0Critical
CVE-2015-841510.0Critical
CVE-2015-841810.0Critical
CVE-2015-841710.0Critical
CVE-2015-806210.0Critical
CVE-2015-840510.0Critical
CVE-2015-840610.0Critical
CVE-2015-840710.0Critical
CVE-2015-840810.0Critical
CVE-2015-840910.0Critical
CVE-2015-841010.0Critical
CVE-2015-841110.0Critical
CVE-2015-841210.0Critical
CVE-2015-841310.0Critical
CVE-2015-841410.0Critical
CVE-2015-806010.0Critical
CVE-2015-806110.0Critical
CVE-2015-80589.3Critical
CVE-2015-805910.0Critical
CVE-2015-806310.0Critical
CVE-2015-805710.0Critical
CVE-2015-805510.0Critical
CVE-2015-845410.0Critical
CVE-2015-84534.3Warning
CVE-2015-845210.0Critical
CVE-2015-845110.0Critical
CVE-2015-84509.3Critical
CVE-2015-84499.3Critical
CVE-2015-84489.3Critical
CVE-2015-84479.3Critical
CVE-2015-84469.3Critical
CVE-2015-84459.3Critical
CVE-2015-842710.0Critical
CVE-2015-845710.0Critical
CVE-2015-842510.0Critical
CVE-2015-842610.0Critical
CVE-2015-805610.0Critical
CVE-2015-843210.0Critical
CVE-2015-842910.0Critical
CVE-2015-843010.0Critical
CVE-2015-843310.0Critical
CVE-2015-843410.0Critical
CVE-2015-845510.0Critical