|
|
|
(Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1033236 |
SecurityTracker URL: http://securitytracker.com/id/1033236
|
CVE Reference:
CVE-2015-5125, CVE-2015-5127, CVE-2015-5129, CVE-2015-5130, CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5550, CVE-2015-5551, CVE-2015-5552, CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556, CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560, CVE-2015-5561, CVE-2015-5562, CVE-2015-5563, CVE-2015-5564, CVE-2015-5565, CVE-2015-5566
(Links to External Site)
|
Date: Aug 11 2015
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 18.0.0.209 and prior
|
Description:
Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.
A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system.
A type confusion flaw may occur [CVE-2015-5554, CVE-2015-5555, CVE-2015-5558, CVE-2015-5562].
A use-after-free may occur [CVE-2015-5550, CVE-2015-5551, CVE-2015-3107, CVE-2015-5556, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5557, CVE-2015-5559, CVE-2015-5127, CVE-2015-5563, CVE-2015-5561, CVE-2015-5564, CVE-2015-5565, CVE-2015-5566].
A heap overflow may occur [CVE-2015-5129, CVE-2015-5541].
A buffer overflow may occur [CVE-2015-5131, CVE-2015-5132, CVE-2015-5133].
A memory corruption error may occur [CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, CVE-2015-5553].
An integer overflow may occur [CVE-2015-5560].
A vector length corruption flaw may occur [CVE-2015-5125].
Chris Evans, Ben Hawkes, and Mateusz Jurczyk of Google Project Zero, Kai Lu of Fortinet's FortiGuard Labs, Wang Wei of the Alibaba Security Research Team, Natalie Silvanovich of Google Project Zero, Chris Evans of Google Project Zero, bilou (via the Chromium Vulnerability Rewards Program), Yuki Chen of Qihoo 360 Vulcan Team, and instruder of the Alibaba Security Research Team reported these vulnerabilities.
|
Impact:
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
|
Solution:
Microsoft has issued a fix for Internet Explorer.
The Microsoft advisory is available at:
https://technet.microsoft.com/library/security/2755801.aspx
|
Vendor URL: technet.microsoft.com/library/security/2755801.aspx (Links to External Site)
|
Cause:
Access control error, Boundary error
|
Underlying OS: Windows (2012), Windows (8), Windows (10)
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|
Go to the Top of This SecurityTracker Archive Page
|