Security updates released on Tuesday by Adobe for Flash Player address a critical vulnerability whose details were disclosed a few days earlier.
The security hole, tracked as CVE-2018-15981, has been described by Adobe as a type confusion bug that allows an attacker to execute arbitrary code in the context of the current user. The flaw has been assigned a priority rating of “1,” which means users should update as soon as possible due to the high risk of exploitation.
The vulnerability has been patched in Flash Player for Windows, macOS, Linux, and Chrome OS with the release of version 188.8.131.52. Version 184.108.40.206 and earlier are impacted.
Adobe warns that technical details about this weakness are publicly available. While the company’s advisory does not credit anyone for discovering the vulnerability, the software giant told SecurityWeek that the issue was identified by Israel-based researcher Gil Dabah.
Dabah wrote a post describing the vulnerability on his personal blog on November 13. A link to the post was published on Twitter the next day. It’s unclear why he decided to make his findings public before Adobe released a patch, but on November 15 he did praise the vendor “for touching base and working on a fix.”
“The interpreter code of the Action Script Virtual Machine (AVM) does not reset a with-scope pointer when an exception is caught, leading later to a type confusion bug, and eventually to a remote code execution,” Dabah explained in his blog post.
This is the second disclosed vulnerability patched by Adobe this month. The company’s Patch Tuesday updates for November 2018 include a fix for a flaw that can lead to hashed NTLM passwords getting leaked.
The security hole had been disclosed by Check Point in April and later patched by Adobe, but EdgeSpot recently discovered that the initial fix could be bypassed.
UPDATE. Dabah told SecurityWeek that this is not the first time he has dropped a Flash Player zero-day and will not be the last.