Adobe has updated Flash Player for Windows, Mac and Linux to address a total of 25 vulnerabilities, including a zero-day that has been exploited in the wild.
Flash Player 18.104.22.168 and 22.214.171.1246 patch type confusion, use-aftre-free, buffer overflow, directory search path, and various memory corruption vulnerabilities that can lead to arbitrary code execution.
The flaw that has been exploited in the wild, CVE-2016-4117, is a type confusion reported by Genwei Jiang of FireEye.
This is not the first time the security firm has reported Flash Player zero-days to Adobe. Last year, the company observed unpatched Flash vulnerabilities being used by the Pawn Storm and APT3 cyber espionage groups. In April, FireEye and the French researcher Kafeine reported a zero-day leveraged by cybercriminals in the Magnitude exploit kit.
In the advisory published on Thursday, Adobe also credited researchers from Microsoft, Pangu LAB, Google, Tencent, CSIRT.SK and NSFOCUS for reporting the vulnerabilities resolved with the latest Flash Player update.
While Adobe’s pre-notification advisory only mentioned CVE-2016-4117, an advisory published by Microsoft on the same day for Flash library updates for Internet Explorer and Edge showed that a total of 25 flaws would be fixed.
Microsoft also patched a vulnerability this week that had been exploited in the wild before a fix was released. Researchers discovered that attackers leveraged vulnerabilities in the JScript and VBScript scripting engines in Windows (CVE-2016-0187 and CVE-2016-0189) to target Internet Explorer users in South Korea.
This week, Adobe also released updates for Reader, Acrobat and ColdFusion to fix nearly 100 vulnerabilities.