Kaspersky ID:
Detect Date:


Multiple serious vulnerabilities have been found in Adobe Flash Player. Malicious users can exploit these vulnerabilities to obtain sensitive information or execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. A buffer overflow/underflow vulnerability in the Primetime TVSDK can be exploited remotely to execute arbitrary code;
  2. Memory corruption vulnerabilities in the Primetime TVSDK API can be exploited remotely to execute arbitrary code;
  3. A vulnerability in the random number generator, which is used from constant binding, can be exploited remotely to obtain sensitive information;
  4. Use-after free vulnerabilities in the ActionScript can be exploited remotely to execute arbitrary code;

Technical details

The SDK mentioned in vulnerability (1) description supports customizing ad information.

Vulnerabilities (2) occur in the Primetime TVSDK API functionalities related to timeline interactions and hosting playback surface.

Vulnerabilities (4) are related to garbage collection in ActionScript 2 VM, ActionScript 2 TextField object variable property and an interaction between the privacy user interface and the ActionScript 2 Camera object.
To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel

Original advisories


Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2017-3003
  • CVE-2017-3002
  • CVE-2017-3001
  • CVE-2017-3000
  • CVE-2017-2999
  • CVE-2017-2998
  • CVE-2017-2997

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.