KLA10711
Multiple vulnerabilities in Adobe Flash Player
Обновлено: 17/06/2019
Дата обнаружения
08/12/2015
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions or execute arbitrary code.

Below is a complete list of vulnerabilities

  1. An unknown vulnerability can be exploited remotely to cause denial of service;
  2. Use-after-free, stack based buffer overflow and buffer overflow can be exploited remotely to execute arbitrary code;
  3. An unknown vulnerability can be exploited remotely to bypass security restrictions;
  4. Heap-based buffer overflow can be exploited remotely via a specially designed XML to execute arbitrary code;
  5. Improper SharedObject implementation can be exploited remotely to execute arbitrary code;
  6. Integer overflow at Shader filter can be exploited remotely via a specially designed BitmapData object to execute arbitrary code.

Technical details

Vulnerability (4) related to toString call.

Vulnerability (5) can be triggered via leveraging type confusion during getRemote call.

Vulnerability (6) can be exploited via large BitmapData.
To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel

Пораженные продукты

Adobe Flash Player versions earlier than 20.0.0.228
Adobe Flash Player ESR versions earlier than 18.0.0.268
Adobe Flash Player for Linux versions earlier than 11.2.202.554
Adobe AIR versions earlier than 20.0.0.204

Решение

Update to the latest version
Get Flash
Get AIR

Первичный источник обнаружения
Adobe bulletin
Оказываемое влияние
?
ACE 
[?]

DoS 
[?]

SB 
[?]
Связанные продукты
Adobe Flash Player ActiveX
Adobe AIR
Adobe Flash Player NPAPI
Adobe Flash Player PPAPI
CVE-IDS
CVE-2015-80509.3Critical
CVE-2015-84429.3Critical
CVE-2015-806410.0Critical
CVE-2015-806510.0Critical
CVE-2015-806910.0Critical
CVE-2015-806810.0Critical
CVE-2015-806710.0Critical
CVE-2015-806610.0Critical
CVE-2015-840210.0Critical
CVE-2015-840110.0Critical
CVE-2015-807110.0Critical
CVE-2015-807010.0Critical
CVE-2015-840410.0Critical
CVE-2015-840310.0Critical
CVE-2015-804710.0Critical
CVE-2015-804510.0Critical
CVE-2015-80499.3Critical
CVE-2015-804810.0Critical
CVE-2015-844310.0Critical
CVE-2015-844410.0Critical
CVE-2015-842810.0Critical
CVE-2015-84399.3Critical
CVE-2015-844010.0Critical
CVE-2015-844110.0Critical
CVE-2015-84569.3Critical
CVE-2015-843510.0Critical
CVE-2015-84369.3Critical
CVE-2015-84379.3Critical
CVE-2015-84389.3Critical
CVE-2015-843110.0Critical
CVE-2015-842410.0Critical
CVE-2015-842310.0Critical
CVE-2015-842010.0Critical
CVE-2015-841910.0Critical
CVE-2015-842210.0Critical
CVE-2015-842110.0Critical
CVE-2015-841610.0Critical
CVE-2015-841510.0Critical
CVE-2015-841810.0Critical
CVE-2015-841710.0Critical
CVE-2015-806210.0Critical
CVE-2015-840510.0Critical
CVE-2015-840610.0Critical
CVE-2015-840710.0Critical
CVE-2015-840810.0Critical
CVE-2015-840910.0Critical
CVE-2015-841010.0Critical
CVE-2015-841110.0Critical
CVE-2015-841210.0Critical
CVE-2015-841310.0Critical
CVE-2015-841410.0Critical
CVE-2015-806010.0Critical
CVE-2015-806110.0Critical
CVE-2015-80589.3Critical
CVE-2015-805910.0Critical
CVE-2015-806310.0Critical
CVE-2015-805710.0Critical
CVE-2015-805510.0Critical
CVE-2015-845410.0Critical
CVE-2015-84534.3Warning
CVE-2015-845210.0Critical
CVE-2015-845110.0Critical
CVE-2015-84509.3Critical
CVE-2015-84499.3Critical
CVE-2015-84489.3Critical
CVE-2015-84479.3Critical
CVE-2015-84469.3Critical
CVE-2015-84459.3Critical
CVE-2015-842710.0Critical
CVE-2015-845710.0Critical
CVE-2015-842510.0Critical
CVE-2015-842610.0Critical
CVE-2015-805610.0Critical
CVE-2015-843210.0Critical
CVE-2015-842910.0Critical
CVE-2015-843010.0Critical
CVE-2015-843310.0Critical
CVE-2015-843410.0Critical
CVE-2015-845510.0Critical