SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Multimedia)  >   Adobe Flash Player Vendors:   Adobe Systems Incorporated
Adobe Flash Player Multiple Bugs Let Remote Users Bypass Same-Origin Restrictions, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
SecurityTracker Alert ID:  1032810
SecurityTracker URL:  http://securitytracker.com/id/1032810
CVE Reference:   CVE-2014-0578, CVE-2015-3097, CVE-2015-3114, CVE-2015-3115, CVE-2015-3116, CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3125, CVE-2015-3126, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131, CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431, CVE-2015-4432, CVE-2015-4433, CVE-2015-5116, CVE-2015-5117, CVE-2015-5118, CVE-2015-5124   (Links to External Site)
Updated:  Jul 18 2015
Original Entry Date:  Jul 8 2015
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 18.0.0.194 and prior; ESR 13.0.0.296 and prior; 11.2.202.468 and prior 11.x versions for Linux
Description:   Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A heap buffer overflow may occur [CVE-2015-3135, CVE-2015-4432, CVE-2015-5118].

A memory corruption error may occur [CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, CVE-2015-4431, CVE-2015-5124].

A null pointer dereference may occur [CVE-2015-3126, CVE-2015-4429].

A type confusion error may occur [CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, CVE-2015-4433].

A use-after-free memory error may occur [CVE-2015-3118, CVE-2015-3124, CVE-2015-5117, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430].

A remote user can bypass same-origin-policy restrictions to potentially sensitive information from the target user's system [CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116].

A remote user can bypass security restrictions to potentially sensitive information from the target user's system [CVE-2015-3114].

A memory address randomization weakness may occur on the program heap on Windows 7 64-bit systems [CVE-2015-3097].

Ben Hawkes of Google Project Zero, bilou (via the Chromium Vulnerability Rewards Program, Chris Evans of Google Project Zero, Ben Hawkes of Google Project Zero, Mateusz Jurczyk of Google Project Zero, David Kraftsow (dontsave) (via HP's Zero Day Initiative, instruder of Alibaba Security Research Team, Kai Kang of Tencent's Xuanwu Lab, Kai Lu of Fortinet's FortiGuard Labs, Jihui Lu of KEEN Team, Malte Batram, Natalie Silvanovich of Google Project Zero, Soroush Dalili from NCC Group, willJ of Tencent PC Manager, Yuki Chen of Qihoo 360 Vulcan Team, and Zreczny Gamon reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can bypass security controls on the target system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix (18.0.0.203, ESR 13.0.0.302, 11.2.202.481 for Linux).

The vendor's advisory is available at:

https://helpx.adobe.com/security/products/flash-player/apsb15-16.html

Vendor URL:  helpx.adobe.com/security/products/flash-player/apsb15-16.html (Links to External Site)
Cause:   Access control error, Boundary error, Randomization error
Underlying OS:  Linux (Any), UNIX (macOS/OS X), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 9 2015 (Red Hat Issues Fix) Adobe Flash Player Multiple Bugs Let Remote Users Bypass Same-Origin Restrictions, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.
Jul 9 2015 (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Multiple Bugs Let Remote Users Bypass Same-Origin Restrictions, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
Microsoft has issued a fix for Microsoft Internet Explorer 10 and 11.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, SecurityGlobal.net LLC