SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Multimedia)  >   Adobe Flash Player Vendors:   Adobe Systems Incorporated
Adobe Flash Player Multiple Bugs Let Remote Users Bypass ASLR, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
SecurityTracker Alert ID:  1032105
SecurityTracker URL:  http://securitytracker.com/id/1032105
CVE Reference:   CVE-2015-0346, CVE-2015-0347, CVE-2015-0348, CVE-2015-0349, CVE-2015-0350, CVE-2015-0351, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0356, CVE-2015-0357, CVE-2015-0358, CVE-2015-0359, CVE-2015-0360, CVE-2015-3038, CVE-2015-3039, CVE-2015-3040, CVE-2015-3041, CVE-2015-3042, CVE-2015-3043, CVE-2015-3044   (Links to External Site)
Updated:  Apr 15 2015
Original Entry Date:  Apr 14 2015
Impact:   Disclosure of system information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 17.0.0.134 and prior, 13.0.0.277 and prior 13.x versions, 11.2.202.451 and prior 11.x versions
Description:   Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass security protections. A remote user can obtain potentially sensitive information on the target system.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

Several memory corruption errors may occur [CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, CVE-2015-3043].

One of these vulnerabilities [CVE-2015-3043] is being actively exploited.

A type confusion error may occur [CVE-2015-0356].

A buffer overflow may occur [CVE-2015-0348].

Several use-after-free memory errors may occur [CVE-2015-0349, CVE-2015-0351, CVE-2015-0358, CVE-2015-3039].

Two double-free memory errors may occur [CVE-2015-0346, CVE-2015-0359].

Two memory leaks can be exploited to bypass address space layout randomization (ASLR) [CVE-2015-0357, CVE-2015-3040].

A user can bypass security protections to obtain potentially sensitive information [CVE-2015-3044].

Anonymous, bilou (via the Chromium Vulnerability Reward Program), Chris Evans of Google Project Zero, instruder of Alibaba Security Research Team, Jihui Lu of KeenTeam (@K33nTeam) (via the Chromium Vulnerability Reward Program), Jouko Pynnonen of Klikki Oy, Michele Spagnoulo of the Google Security Team, Mark Brand of Google Project Zero, Natalie Silvanovich (via Google Project Zero), Nicolas Joly (via HP's Zero Day Initiative, Steven Vittitoe of Google Project Zero, and s3tm3m (via HP's Zero Day Initiative reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can bypass ASLR security protections on the target system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix (17.0.0.169, 13.0.0.281 ESR, 11.2.202.457 for Linux).

The vendor's advisory is available at:

https://helpx.adobe.com/security/products/flash-player/apsb15-06.html

Vendor URL:  helpx.adobe.com/security/products/flash-player/apsb15-06.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Any), UNIX (macOS/OS X), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Apr 15 2015 (Red Hat Issues Fix) Adobe Flash Player Multiple Bugs Let Remote Users Bypass ASLR, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC