SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Adobe Flash Player Vendors:   Adobe Systems Incorporated
Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code and Bypass Security Controls
SecurityTracker Alert ID:  1030822
SecurityTracker URL:  http://securitytracker.com/id/1030822
CVE Reference:   CVE-2014-0547, CVE-2014-0548, CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, CVE-2014-0552, CVE-2014-0553, CVE-2014-0554, CVE-2014-0555, CVE-2014-0556, CVE-2014-0557, CVE-2014-0559   (Links to External Site)
Date:  Sep 9 2014
Impact:   Disclosure of system information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 14.0.0.179 and prior; 13.0.0.241 and prior 13.x versions
Description:   Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass security controls.

A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2014-0547, CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, CVE-2014-0552, CVE-2014-0555]. The code will run with the privileges of the target user.

A remote user can trigger a memory leak to bypass memory address randomization [CVE-2014-0557].

A remote user can bypass security [CVE-2014-0554].

A remote user can trigger a use-after-free memory error to execute arbitrary code [CVE-2014-0553].

A remote user can bypass same origin policy [CVE-2014-0548].

A remote user can trigger a heap overflow to execute arbitrary code [CVE-2014-0556, CVE-2014-0559].

Chris Evans of Google Project Zero, Michal Zalewski of the Google Security Team, Masato Kinugawa, Liu Jincheng and Wen Guanxing from Venustech ADLAB, Bas Venis and Masato Kinugawa, and Lucas Leong of Trend Micro reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can bypass security controls.

Solution:   The vendor has issued a fix (13.0.0.244 Extended Release, 15.0.0.152 for Windows/Mac, 11.2.202.406 for Linux).

The vendor's advisory is available at:

http://helpx.adobe.com/security/products/flash-player/apsb14-21.html

Vendor URL:  helpx.adobe.com/security/products/flash-player/apsb14-21.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Any), UNIX (macOS/OS X), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Sep 9 2014 (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code and Bypass Security Controls
Microsoft has issued a fix for Internet Explorer 10 and 11.
Sep 10 2014 (Red Hat Issues Fix) Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code and Bypass Security Controls
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC