Release date: June 16, 2016
Vulnerability identifier: APSB16-18
Priority: See table below
CVE number: CVE-2016-4122, CVE-2016-4123, CVE-2016-4124, CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129, CVE-2016-4130, CVE-2016-4131, CVE-2016-4132, CVE-2016-4133, CVE-2016-4134, CVE-2016-4135, CVE-2016-4136, CVE-2016-4137, CVE-2016-4138, CVE-2016-4139, CVE-2016-4140, CVE-2016-4141, CVE-2016-4142, CVE-2016-4143, CVE-2016-4144, CVE-2016-4145, CVE-2016-4146, CVE-2016-4147, CVE-2016-4148, CVE-2016-4149, CVE-2016-4150, CVE-2016-4151, CVE-2016-4152, CVE-2016-4153, CVE-2016-4154, CVE-2016-4155, CVE-2016-4156, CVE-2016-4166, CVE-2016-4171
Platform: Windows, Macintosh, Linux and ChromeOS
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
Adobe is aware of a report that an exploit for CVE-2016-4171 exists in the wild, and is being used in limited, targeted attacks. Please refer to APSA16-03 for additional details.
Product | Affected Versions | Platform |
---|---|---|
Adobe Flash Player Desktop Runtime | 21.0.0.242 and earlier | Windows and Macintosh |
Adobe Flash Player Extended Support Release | 18.0.0.352 and earlier | Windows and Macintosh |
Adobe Flash Player for Google Chrome | 21.0.0.242 and earlier | Windows, Macintosh, Linux and ChromeOS |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 | 21.0.0.242 and earlier | Windows 10 and 8.1 |
Adobe Flash Player for Linux | 11.2.202.621 and earlier | Linux |
- To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product | Updated Versions | Platform | Priority rating | Availability |
---|---|---|---|---|
Adobe Flash Player Desktop Runtime | 22.0.0.192 | Windows and Macintosh | 1 | |
Adobe Flash Player Extended Support Release | 18.0.0.360 | Windows and Macintosh | 1 | Extended Support |
Adobe Flash Player for Google Chrome | 22.0.0.192 | Windows, Macintosh, Linux and ChromeOS | 1 | Google Chrome Releases |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 | 22.0.0.192 | Windows 10 and 8.1 | 1 | Microsoft Security Advisory |
Adobe Flash Player for Linux | 11.2.202.626 | Linux | 3 | Flash Player Download Center |
- Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows and Macintosh update to 22.0.0.192 via the update mechanism within the product when prompted [1], or by visiting the Adobe Flash Player Download Center.
- Adobe recommends users of the Adobe Flash Player Extended Support Release should update to version 18.0.0.360 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html.
- Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.626 by visiting the Adobe Flash Player Download Center.
- Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 22.0.0.192 for Windows, Macintosh, Linux and Chrome OS.
- Adobe Flash Player installed with Microsoft Edge and Internet Explorer for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 22.0.0.192.
- Please visit the Flash Player Help page for assistance in installing Flash Player.
[1] Users of Flash Player 11.2.x or later for Windows, or Flash Player 11.3.x or later for Macintosh, who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.
- These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2016-4144, CVE-2016-4149).
- These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-4142, CVE-2016-4143, CVE-2016-4145, CVE-2016-4146, CVE-2016-4147, CVE-2016-4148).
- These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2016-4135, CVE-2016-4136, CVE-2016-4138).
- These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-4122, CVE-2016-4123, CVE-2016-4124, CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129, CVE-2016-4130, CVE-2016-4131, CVE-2016-4132, CVE-2016-4133, CVE-2016-4134, CVE-2016-4137, CVE-2016-4141, CVE-2016-4150, CVE-2016-4151, CVE-2016-4152, CVE-2016-4153, CVE-2016-4154, CVE-2016-4155, CVE-2016-4156, CVE-2016-4166, CVE-2016-4171).
- These updates resolve a vulnerability in the directory search path used to find resources that could lead to code execution (CVE-2016-4140).
- These updates resolve a vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2016-4139).
- Aleksandar Nikolic of Cisco Talos (CVE-2016-4132)
- Mateusz Jurczyk and Natalie Silvanovich of Google Project Zero (CVE-2016-4135, CVE-2016-4136, CVE-2016-4137, CVE-2016-4138)
- willJ of Tencent PC Manager (CVE-2016-4122, CVE-2016-4123, CVE-2016-4124, CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129, CVE-2016-4130, CVE-2016-4131, CVE-2016-4134, CVE-2016-4166)
- Nicolas Joly of Microsoft Vulnerability Research (CVE-2016-4142, CVE-2016-4143, CVE-2016-4144, CVE-2016-4145, CVE-2016-4146, CVE-2016-4147, CVE-2016-4148)
- Wen Guanxing from Pangu LAB (CVE-2016-4150, CVE-2016-4152, CVE-2016-4153, CVE-2016-4154, CVE-2016-4155, CVE-2016-4156)
- LMX of the Qihoo 360 Codesafe Team (CVE-2016-4141)
- Dan Caselden of FireEye (CVE-2016-4140)
- Wen Guanxing from Pangu LAB. (CVE-2016-4151)
- Genwei Jiang of FireEye (CVE-2016-4149)
- Sebastian Lekies of Google (CVE-2016-4139)
- kelvinwang of Tencent PC Manager (CVE-2016-4133)
- Anton Ivanov of Kaspersky (CVE-2016-4171)
- wong chee tat :)
No comments:
Post a Comment