Kaspersky ID:
KLA10993
Detect Date:
04/11/2017
Updated:
01/22/2024

Description

Multiple serious vulnerabilities have been found in Adobe Flash Player. Malicious users can exploit these vulnerabilities to execute arbitary code.

Below is a complete list of vulnerabilities:

  1. Use-after-free vulnerabilities in the sound class, in the internal script object and in the ActionScript2 NetStream class can be exploited remotely to execute arbitrary code;
  2. Use-after-free vulnerability in the ActionScript related to creating a getter/setter property can be exploited remotely to execute arbitrary code;
  3. Memory corruption vulnerabilities in the ActionScript2 code parser and in the SWF parser can be exploited remotely to execute arbitrary code;
  4. Memory corruption vulnerability in parsing of a shape outline can be exploited remotely to execute arbitrary code.

Technical details

To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2017-3058
    critical
  • CVE-2017-3064
    critical
  • CVE-2017-3063
    critical
  • CVE-2017-3062
    critical
  • CVE-2017-3061
    critical
  • CVE-2017-3060
    critical
  • CVE-2017-3059
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.