Searching
..

Click anywhere to stop

KLA10993
Arbitrary code execution vulnerabilities in Adobe Flash Player

Обновлено: 22/01/2024
Дата обнаружения
11/04/2017
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Adobe Flash Player. Malicious users can exploit these vulnerabilities to execute arbitary code.

Below is a complete list of vulnerabilities:

  1. Use-after-free vulnerabilities in the sound class, in the internal script object and in the ActionScript2 NetStream class can be exploited remotely to execute arbitrary code;
  2. Use-after-free vulnerability in the ActionScript related to creating a getter/setter property can be exploited remotely to execute arbitrary code;
  3. Memory corruption vulnerabilities in the ActionScript2 code parser and in the SWF parser can be exploited remotely to execute arbitrary code;
  4. Memory corruption vulnerability in parsing of a shape outline can be exploited remotely to execute arbitrary code.

Technical details

To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel

Пораженные продукты

Adobe Flash Player versions earlier than 25.0.0.148 

Решение

Update to the latest version
Download Adobe Flash Player

Первичный источник обнаружения
Adobe security bulletin
Оказываемое влияние
?
ACE 
[?]
Связанные продукты
Adobe Flash Player ActiveX
Adobe Flash Player NPAPI
Adobe Flash Player PPAPI
CVE-IDS
CVE-2017-30589.3Critical
CVE-2017-30649.3Critical
Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Узнай статистику распространения уязвимостей в твоем регионе