KLA11041
Arbitrary code execution vulnerabilities in Adobe Flash Player

Обновлено: 18/06/2020
Дата обнаружения
13/06/2017
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Adobe Flash Player. Malicious users can exploit these vulnerabilities to execute arbitrary code.

  1. A use-after-free vulnerability related to manipulating the ActionScript 2 XML class can be exploited remotely to execute arbitrary code;
  2. A use-after-free vulnerability related to internal computation that is caused by multiple display object mask manipulations can be exploited remotely to execute arbitrary code;
  3. A use-after-free vulnerability in the Primetime SDK can be exploited remotely to execute arbitrary code;
  4. A use-after-free vulnerability in the advertising metadata functionality can be exploited remotely to execute arbitrary code;
  5. Memory corruption vulnerabilities in the MPEG-4 AVC and in the ATF (Adobe Texture Format) modules can be exploited remotely to execute arbitrary code;
  6. Memory corruption vulnerabilities in the PNG image parser and in the internal representation of raster data can be exploited remotely to execute arbitrary code;
  7. A memory corruption vulnerability in the LocaleID class can be exploited remotely to execute arbitrary code.

Technical details

In case of vulnerability (3), functionality in the Primetime SDK, which is related to the profile metadata of the media stream works improperly.
To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel

Пораженные продукты

Adobe Flash Player versions earlier than 26.0.0.126

Решение

Update to the latest versions
Download Adobe Flash Player

Первичный источник обнаружения
Adobe Security Bulletin
Оказываемое влияние
?
ACE 
[?]
Связанные продукты
Adobe Flash Player ActiveX
Adobe Flash Player NPAPI
Adobe Flash Player PPAPI
Эксплуатация

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/42249

https://www.exploit-db.com/exploits/42248

https://www.exploit-db.com/exploits/42247

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Узнай статистику распространения уязвимостей в твоем регионе