Kaspersky ID:
KLA10993
Дата обнаружения:
11/04/2017
Обновлено:
22/01/2024

Описание

Multiple serious vulnerabilities have been found in Adobe Flash Player. Malicious users can exploit these vulnerabilities to execute arbitary code.

Below is a complete list of vulnerabilities:

  1. Use-after-free vulnerabilities in the sound class, in the internal script object and in the ActionScript2 NetStream class can be exploited remotely to execute arbitrary code;
  2. Use-after-free vulnerability in the ActionScript related to creating a getter/setter property can be exploited remotely to execute arbitrary code;
  3. Memory corruption vulnerabilities in the ActionScript2 code parser and in the SWF parser can be exploited remotely to execute arbitrary code;
  4. Memory corruption vulnerability in parsing of a shape outline can be exploited remotely to execute arbitrary code.

Technical details

To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2017-3058
    critical
  • CVE-2017-3064
    critical
  • CVE-2017-3063
    critical
  • CVE-2017-3062
    critical
  • CVE-2017-3061
    critical
  • CVE-2017-3060
    critical
  • CVE-2017-3059
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.