Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Adobe Fixes 18 Vulnerabilities in Flash Player

Adobe has released security updates for Flash Player on all platforms to fix a total of 18 vulnerabilities, many of which can be exploited for arbitrary code execution.

Adobe is advising Windows and Mac users to update their installations to Adobe Flash Player 15.0.0.223. Linux users should update to Adobe Flash Player 11.2.202.418.

Adobe has released security updates for Flash Player on all platforms to fix a total of 18 vulnerabilities, many of which can be exploited for arbitrary code execution.

Adobe is advising Windows and Mac users to update their installations to Adobe Flash Player 15.0.0.223. Linux users should update to Adobe Flash Player 11.2.202.418.

An advisory published by the company on Tuesday shows that earlier versions of the application are affected by four memory corruption vulnerabilities (CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441) that can be leveraged for code execution.

Attackers can also execute arbitrary code on affected systems by exploiting one of the three use-after-free vulnerabilities (CVE-2014-0573, CVE-2014-0588, CVE-2014-8438) plaguing previous variants of Flash Player.

Other flaws that could lead to code execution are a double free vulnerability (CVE-2014-0574), five type confusion vulnerabilities (CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0590), and two heap buffer overflows (CVE-2014-0582, CVE-2014-0589).

The latest version of Adobe Flash Player also addresses an information disclosure bug that can be exploited to disclose session tokens (CVE-2014-8437), a heap buffer overflow that can be exploited for privilege escalation (CVE-2014-0583), and a permission issue that can also be exploited for privilege escalation (CVE-2014-8442). According to Adobe, the privilege escalation vulnerabilities can be used to escalate privileges from low to medium integrity level.

Over a dozen individuals have been credited for finding and responsibly disclosing these security holes. The list includes Ian Beer, Tavis Ormandy and Chris Evans of Google Project Zero, who found a total of seven flaws; a researcher using the online moniker “bilou”; Behrang Fouladi and Axel Souchet of Microsoft Vulnerability Research; Liu Jincheng and Wen Guanxing of Venustech ADLAB; Haifei Li of McAfee; Lucas Leong of TrendMicro; Nicolas Joly; Natalie Silvanovich; and SuperHei of KnownSec.

Users of the Adobe AIR cross-platform run-time system are also advised to update their installations because Adobe AIR is affected as well.

Advertisement. Scroll to continue reading.

Flash Player installed with the Internet Explorer Web browser for Windows 8.x will be automatically updated to the latest version, Adobe said.

Google has released a new version of Chrome which includes the update for Flash Player and fixes for other bugs. The United States Computer Emergency Readiness Team (US-CERT) published an alert on Tuesday encouraging users and administrators to update their Chrome installations.

It’s important that users and administrators patch Adobe Flash Player immediately after an update is released. Last month, researchers reported that cybercriminals had added a Flash Player exploit to the Fiesta exploit kit just one week after Adobe released a patch for it.  Experts believe the malicious actors built the exploit by reverse engineering Adobe’s patch.

Microsoft also released 14 security bulletins as part of Patch Tuesday, including a critical update for Internet Explorer.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.