SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Multimedia)  >   Adobe Flash Player Vendors:   Adobe Systems Incorporated
Adobe Flash Player Multiple Flaws Let Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code
SecurityTracker Alert ID:  1041058
SecurityTracker URL:  http://securitytracker.com/id/1041058
CVE Reference:   CVE-2018-4945, CVE-2018-5000, CVE-2018-5001, CVE-2018-5002   (Links to External Site)
Date:  Jun 11 2018
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 29.0.0.171 and before
Description:   Several vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information on the target system.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A type confusion error may occur [CVE-2018-4945].

A stack overflow may occur [CVE-2018-5002].

A remote user can create specially crafted content that, when loaded by the target user, will obtain potentially sensitive information on the target user's system.

An integer overflow may occur [CVE-2018-5000].

An out-of-bounds memory read error may occur [CVE-2018-5001].

Jihui Lu of Tencent Keen Lab and willJ of Tencent PC Manager (via Trend Micro's Zero Day Initiative), an anonymous researcher (via Trend Micro's Zero Day Initiative), Chenming Xu and Jason Jones of ICEBRG, Zeng Haitao and Huang Chaowen of 360 Threat Intelligence Center of 360 Enterprise Security Group, and Yang Kang, Hu Jiang, Zhang Qing, and Jin Quan of Qihoo 360 Core Security, Tencent PCManager, reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix (30.0.0.113).

The vendor advisory is available at:

https://helpx.adobe.com/security/products/flash-player/apsb18-19.html

Vendor URL:  helpx.adobe.com/security/products/flash-player/apsb18-19.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Any), UNIX (macOS/OS X), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jun 11 2018 (Red Hat Issues Fix) Adobe Flash Player Multiple Flaws Let Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
Jun 12 2018 (Microsoft Issues Fix) Adobe Flash Player Multiple Flaws Let Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code
Microsoft has issued a fix.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC