KLA10810
Code execution vulnerabilities in Adobe Flash Player

Обновлено: 18/06/2020
Дата обнаружения
12/05/2016
Уровень угрозы
Critical
Описание

Type confusion, use-after-free, buffer overflow, memory corruption and unsafe search path vulnerabilities were found in Adobe Flash Player. By exploiting these vulnerabilities malicious users can execute arbitrary code. These vulnerabilities can be exploited remotely.


Technical details

To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel

Пораженные продукты

Adobe Flash Player versions earlier than 21.0.0.242
Adobe Flash Player Extended Support Release versions earlier than 18.0.0.532
Adobe Flash Player for Linux versions earlier than 11.2.202.621
Adobe AIR versions earlier than 21.0.0.215

Решение

Update to the latest version
Adobe Flash Player download page
Adobe AIR download page

Первичный источник обнаружения
Adobe security bulletin
Оказываемое влияние
?
ACE 
[?]
Связанные продукты
Adobe Flash Player ActiveX
Adobe Flash Player NPAPI
Adobe Flash Player PPAPI
CVE-IDS
CVE-2016-11107.6Critical
CVE-2016-41167.6Critical
CVE-2016-41137.6Critical
CVE-2016-41127.6Critical
CVE-2016-41157.6Critical
CVE-2016-41147.6Critical
CVE-2016-11037.6Critical
CVE-2016-11027.6Critical
CVE-2016-11017.6Critical
CVE-2016-11007.6Critical
CVE-2016-11077.6Critical
CVE-2016-11067.6Critical
CVE-2016-11057.6Critical
CVE-2016-11047.6Critical
CVE-2016-11097.6Critical
CVE-2016-11087.6Critical
CVE-2016-41107.6Critical
CVE-2016-41117.6Critical
CVE-2016-41087.6Critical
CVE-2016-41097.6Critical
CVE-2016-10967.6Critical
CVE-2016-10977.6Critical
CVE-2016-10987.6Critical
CVE-2016-10997.6Critical
Эксплуатация

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/39826

https://www.exploit-db.com/exploits/39824

https://www.exploit-db.com/exploits/39827

https://www.exploit-db.com/exploits/39831

https://www.exploit-db.com/exploits/39829

https://www.exploit-db.com/exploits/39825

https://www.exploit-db.com/exploits/46339

https://www.exploit-db.com/exploits/39830

https://www.exploit-db.com/exploits/39828

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Узнай статистику распространения уязвимостей в твоем регионе