KLA10839
Multiple vulnerabilities in Adobe Flash Player
Обновлено: 18/06/2020
Дата обнаружения
12/07/2016
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Adobe Flash Player. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information and possibly cause denial of service.

Below is a complete list of vulnerabilities

  1. Race condition and lack of restrictions vulnerabilities could be exploited remotely to obtain sensitive information;
  2. Type confusion, heap buffer overflow, use-after-free and memory corruption vulnerabilities could be exploited remotely to execute arbitrary code;
  3. Memory leak vulnerability can be exploited remotely to cause denial of service.

Technical details

To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel

Пораженные продукты

Adobe Flash Player versions earlier than 22.0.0.209
Adobe Flash Player for Linux versions earlier than 11.2.202.623
Adobe Flash Player Extended Support Release versions earlier than 18.0.0.366

Решение

Update to the latest version
Get Flash Player

Первичный источник обнаружения
Adobe original advisory
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]
Связанные продукты
Adobe Flash Player ActiveX
Adobe Flash Player NPAPI
Adobe Flash Player PPAPI
CVE-IDS
CVE-2016-421710.0Critical
CVE-2016-421810.0Critical
CVE-2016-421910.0Critical
CVE-2016-422010.0Critical
CVE-2016-422110.0Critical
CVE-2016-42226.8High
CVE-2016-42236.8High
CVE-2016-42246.8High
CVE-2016-42256.8High
CVE-2016-422610.0Critical
CVE-2016-422710.0Critical
CVE-2016-422810.0Critical
CVE-2016-422910.0Critical
CVE-2016-423010.0Critical
CVE-2016-423110.0Critical
CVE-2016-42325.0Critical
CVE-2016-423310.0Critical
CVE-2016-423410.0Critical
CVE-2016-423510.0Critical
CVE-2016-423610.0Critical
CVE-2016-423710.0Critical
CVE-2016-423810.0Critical
CVE-2016-423910.0Critical
CVE-2016-424910.0Critical
CVE-2016-424810.0Critical
CVE-2016-42474.3Warning
CVE-2016-424610.0Critical
CVE-2016-424510.0Critical
CVE-2016-424410.0Critical
CVE-2016-424310.0Critical
CVE-2016-424210.0Critical
CVE-2016-424110.0Critical
CVE-2016-424010.0Critical
CVE-2016-417210.0Critical
CVE-2016-417310.0Critical
CVE-2016-417410.0Critical
CVE-2016-417510.0Critical
CVE-2016-417610.0Critical
CVE-2016-417710.0Critical
CVE-2016-41785.0Critical
CVE-2016-417910.0Critical
CVE-2016-418010.0Critical
CVE-2016-418110.0Critical
CVE-2016-418210.0Critical
CVE-2016-418310.0Critical
CVE-2016-418410.0Critical
CVE-2016-418510.0Critical
CVE-2016-418610.0Critical
CVE-2016-418710.0Critical
CVE-2016-418810.0Critical
CVE-2016-418910.0Critical
CVE-2016-419010.0Critical
Эксплуатация

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/40308

https://www.exploit-db.com/exploits/40307

https://www.exploit-db.com/exploits/40309

https://www.exploit-db.com/exploits/40310

https://www.exploit-db.com/exploits/40311

https://www.exploit-db.com/exploits/40356

https://www.exploit-db.com/exploits/40355

https://www.exploit-db.com/exploits/40103

https://www.exploit-db.com/exploits/40105

https://www.exploit-db.com/exploits/40104

https://www.exploit-db.com/exploits/40102