Adobe Flash Player Multiple Bugs Let Remote Users Obtain Session Tokens and Execute Arbitrary Code
|
SecurityTracker Alert ID: 1031182 |
SecurityTracker URL: http://securitytracker.com/id/1031182
|
CVE Reference:
CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577, CVE-2014-0581, CVE-2014-0582, CVE-2014-0583, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8437, CVE-2014-8438, CVE-2014-8440, CVE-2014-8441, CVE-2014-8442
(Links to External Site)
|
Updated: Nov 20 2014
|
Original Entry Date: Nov 11 2014
|
Impact:
Disclosure of authentication information, Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 15.0.0.189 and prior; 13.0.0.250 and prior 13.x; 11.2.202.411 and prior for Linux
|
Description:
Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain elevated privileges. A remote user can obtain session tokens.
A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system.
A memory corruption error may occur [CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441].
A use-after-free error may occur [CVE-2014-0573, CVE-2014-0588, CVE-2014-8438].
A double-free memory error may occur [CVE-2014-0574].
A type confusion error may occur [CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0590].
A heap overflow may occur [CVE-2014-0582, CVE-2014-0589].
A remote user can obtain session tokens [CVE-2014-8437].
A heap overflow may allow privilege escalation from low to medium integrity level [CVE-2014-0583].
A permission error may allow privilege escalation from low to medium integrity level [CVE-2014-8442].
Liu Jincheng and Wen Guanxing of Venustech ADLAB, Nicolas Joly, Lucas Leong of TrendMicro, Tavis Ormandy and Chris Evans of Google Project Zero, Natalie Silvanovich (via Google Project Zero, SuperHei of KnownSec, and an anonymous
researcher reported these vulnerabilities.
|
Impact:
A remote user can content that, when loaded by the target user, will execute arbitrary code on the target user's system.
A remote user can obtain session tokens.
|
Solution:
The vendor has issued a fix (15.0.0.223 for Windows/Mac, ESR 13.0.0.252, 11.2.202.418 for Linux).
The vendor's advisory is available at:
http://helpx.adobe.com/security/products/flash-player/apsb14-24.html
|
Vendor URL: helpx.adobe.com/security/products/flash-player/apsb14-24.html (Links to External Site)
|
Cause:
Access control error, Boundary error
|
Underlying OS: Linux (Any), UNIX (macOS/OS X), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|