SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Adobe Flash Player Vendors:   Adobe Systems Incorporated
Adobe Flash Player Multiple Bugs Let Remote Users Obtain Session Tokens and Execute Arbitrary Code
SecurityTracker Alert ID:  1031182
SecurityTracker URL:  http://securitytracker.com/id/1031182
CVE Reference:   CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577, CVE-2014-0581, CVE-2014-0582, CVE-2014-0583, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8437, CVE-2014-8438, CVE-2014-8440, CVE-2014-8441, CVE-2014-8442   (Links to External Site)
Updated:  Nov 20 2014
Original Entry Date:  Nov 11 2014
Impact:   Disclosure of authentication information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 15.0.0.189 and prior; 13.0.0.250 and prior 13.x; 11.2.202.411 and prior for Linux
Description:   Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain elevated privileges. A remote user can obtain session tokens.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system.

A memory corruption error may occur [CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441].

A use-after-free error may occur [CVE-2014-0573, CVE-2014-0588, CVE-2014-8438].

A double-free memory error may occur [CVE-2014-0574].

A type confusion error may occur [CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0590].

A heap overflow may occur [CVE-2014-0582, CVE-2014-0589].

A remote user can obtain session tokens [CVE-2014-8437].

A heap overflow may allow privilege escalation from low to medium integrity level [CVE-2014-0583].

A permission error may allow privilege escalation from low to medium integrity level [CVE-2014-8442].

Liu Jincheng and Wen Guanxing of Venustech ADLAB, Nicolas Joly, Lucas Leong of TrendMicro, Tavis Ormandy and Chris Evans of Google Project Zero, Natalie Silvanovich (via Google Project Zero, SuperHei of KnownSec, and an anonymous
researcher reported these vulnerabilities.

Impact:   A remote user can content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain session tokens.

Solution:   The vendor has issued a fix (15.0.0.223 for Windows/Mac, ESR 13.0.0.252, 11.2.202.418 for Linux).

The vendor's advisory is available at:

http://helpx.adobe.com/security/products/flash-player/apsb14-24.html

Vendor URL:  helpx.adobe.com/security/products/flash-player/apsb14-24.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Any), UNIX (macOS/OS X), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 11 2014 (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Multiple Bugs Let Remote Users Obtain Session Tokens and Execute Arbitrary Code
Microsoft has issued a fix for Internet Explorer 10 and 11.
Nov 13 2014 (Red Hat Issues Fix) Adobe Flash Player Multiple Bugs Let Remote Users Obtain Session Tokens and Execute Arbitrary Code
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.
Nov 20 2014 (Google Issues Fix for Google Chrome) Adobe Flash Player Multiple Bugs Let Remote Users Obtain Session Tokens and Execute Arbitrary Code
Google has issued a fix for Google Chrome.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC