KLA11041
Arbitrary code execution vulnerabilities in Adobe Flash Player
Updated: 06/21/2017
CVSS
?
0.0
Detect date
?
06/12/2017
Severity
?
Warning
Description

Multiple serious vulnerabilities have been found in Adobe Flash Player. Malicious users can exploit these vulnerabilities to execute arbitrary code.

  1. A  use-after-free vulnerability related to manipulating the ActionScript 2 XML class can be exploited remotely to execute arbitrary code;
  2. A  use-after-free vulnerability related to internal computation that is caused by multiple display object mask manipulations can be exploited remotely to execute arbitrary code;
  3. A  use-after-free vulnerability in the Primetime SDK can be exploited remotely to execute arbitrary code;
  4. A  use-after-free vulnerability in the advertising metadata functionality can be exploited remotely to execute arbitrary code;
  5. Memory corruption vulnerabilities in the MPEG-4 AVC and in the ATF (Adobe Texture Format) modules can be exploited remotely to execute arbitrary code;
  6. Memory corruption vulnerabilities in the PNG image parser and in the internal representation of raster data can be exploited remotely to execute arbitrary code;
  7. A memory corruption vulnerability in the LocaleID class can be exploited remotely to execute arbitrary code.

Technical details

In case of vulnerability (3), functionality in the Primetime SDK, which is related to the profile metadata of the media stream works improperly.

NB: These vulnerabilities do not have any public CVSS rating so rating can be changed by the time.

Affected products

Adobe Flash Player versions earlier than 26.0.0.126

Solution

Update to the latest versions
Download Adobe Flash Player

Original advisories

Adobe Security Bulletin

Impacts
?
ACE 
[?]
Related products
Adobe Flash Player PPAPI
Adobe Flash Player NPAPI
Adobe Flash Player ActiveX
CVE-IDS
?

CVE-2017-3075
CVE-2017-3076
CVE-2017-3077
CVE-2017-3078
CVE-2017-3079
CVE-2017-3081
CVE-2017-3082
CVE-2017-3083
CVE-2017-3084