(Red Hat Issues Fix) Adobe Flash Player Bugs Let Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code
SecurityTracker Alert ID: 1038871|
SecurityTracker URL: http://securitytracker.com/id/1038871
CVE-2017-3080, CVE-2017-3099, CVE-2017-3100
(Links to External Site)
Date: Jul 12 2017
Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 22.214.171.124 and before|
Several vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information on the target system.|
A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system [CVE-2017-3099].
A remote user can create specially crafted content that, when loaded by the target user, will bypass security restrictions and obtain potentially sensitive information [CVE-2017-3080].
A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and obtain potentially sensitive memory address information [CVE-2017-3100].
bo13oy (via Trend Micro's Zero Day Initiative) and Jihui Lu of Tencent KeenLab reported these vulnerabilities.
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.|
A remote user can obtain potentially sensitive information on the target system.
Red Hat has issued a fix.|
The Red Hat advisory is available at:
Vendor URL: access.redhat.com/errata/RHSA-2017:1731 (Links to External Site)
Access control error|
|Underlying OS: Linux (Red Hat Enterprise)|
|Underlying OS Comments: 6|
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Subject: [RHSA-2017:1731-01] Critical: flash-plugin security update|
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2017:1731-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://access.redhat.com/errata/RHSA-2017:1731
Issue date: 2017-07-12
CVE Names: CVE-2017-3080 CVE-2017-3099 CVE-2017-3100
An update for flash-plugin is now available for Red Hat Enterprise Linux 6
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.
This update upgrades Flash Player to version 126.96.36.199.
* This update fixes multiple vulnerabilities in Adobe Flash Player. These
vulnerabilities, detailed in the Adobe Security Bulletin listed in the
References section, could allow an attacker to create a specially crafted
SWF file that would cause flash-plugin to crash, execute arbitrary code, or
disclose sensitive information when the victim loaded a page containing the
malicious SWF content. (CVE-2017-3080, CVE-2017-3099, CVE-2017-3100)
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
5. Bugs fixed (https://bugzilla.redhat.com/):
1469762 - CVE-2017-3099 flash-plugin: code execution issue fixed in APSB17-21
1469763 - CVE-2017-3080 CVE-2017-3100 flash-plugin: code execution issue fixed in APSB17-21
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
Red Hat Enterprise Linux Server Supplementary (v. 6):
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
The Red Hat security contact is <email@example.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
-----END PGP SIGNATURE-----
RHSA-announce mailing list