Описание
Multiple serious vulnerabilities have been found in Adobe Flash Player. Malicious users can exploit these vulnerabilities to execute arbitrary code.
- A use-after-free vulnerability related to manipulating the ActionScript 2 XML class can be exploited remotely to execute arbitrary code;
- A use-after-free vulnerability related to internal computation that is caused by multiple display object mask manipulations can be exploited remotely to execute arbitrary code;
- A use-after-free vulnerability in the Primetime SDK can be exploited remotely to execute arbitrary code;
- A use-after-free vulnerability in the advertising metadata functionality can be exploited remotely to execute arbitrary code;
- Memory corruption vulnerabilities in the MPEG-4 AVC and in the ATF (Adobe Texture Format) modules can be exploited remotely to execute arbitrary code;
- Memory corruption vulnerabilities in the PNG image parser and in the internal representation of raster data can be exploited remotely to execute arbitrary code;
- A memory corruption vulnerability in the LocaleID class can be exploited remotely to execute arbitrary code.
Technical details
In case of vulnerability (3), functionality in the Primetime SDK, which is related to the profile metadata of the media stream works improperly.
To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2017-3084 critical
- CVE-2017-3083 critical
- CVE-2017-3082 critical
- CVE-2017-3081 critical
- CVE-2017-3079 critical
- CVE-2017-3078 critical
- CVE-2017-3077 critical
- CVE-2017-3076 critical
- CVE-2017-3075 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com