The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

security weakness CVE-2017-2925 CVE-2017-2926 CVE-2017-2927

Adobe Flash Player: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Severity of this weakness: 4/4.
Number of vulnerabilities in this bulletin: 13.
Creation date: 10/01/2017.
Revision date: 15/03/2017.
Références of this bulletin: 1005, 1006, 1015, 1016, 1017, 3214628, APSB17-02, CERTFR-2017-AVI-006, CERTFR-2017-AVI-007, CVE-2017-2925, CVE-2017-2926, CVE-2017-2927, CVE-2017-2928, CVE-2017-2930, CVE-2017-2931, CVE-2017-2932, CVE-2017-2933, CVE-2017-2934, CVE-2017-2935, CVE-2017-2936, CVE-2017-2937, CVE-2017-2938, MS17-003, openSUSE-SU-2017:0107-1, RHSA-2017:0057-01, SUSE-SU-2017:0108-1, VIGILANCE-VUL-21540.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Adobe Flash Player.

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2017-2938]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2932]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2936]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2937]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2927]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2933]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2934]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2935]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2925]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2926]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2928]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2930]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2931]
Full Vigil@nce bulletin... (Free trial)

This threat bulletin impacts software or systems such as Flash Player, Windows 10, Windows 2012, Windows 2016, Windows 8, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES.

Our Vigil@nce team determined that the severity of this computer threat bulletin is critical.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 13 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a specialist ability can exploit this computer threat.

Solutions for this threat

Adobe Flash Player: version 24.0.0.194.
The version 24.0.0.194 is fixed:
  http://www.adobe.com/go/getflash

openSUSE 13.2: new flash-player packages.
New packages are available:
  openSUSE 13.2: flash-player 24.0.0.194-2.124.1

RHEL: new flash-plugin packages.
New packages are available:
  RHEL 6: flash-plugin 24.0.0.194-1.el6_8

SUSE LE 12: new flash-player packages.
New packages are available:
  SUSE LE 12 SP1: flash-player 24.0.0.194-155.1

Windows: patch for Adobe Flash Player.
A patch is available:
  https://support.microsoft.com/kb/3214628
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides cybersecurity bulletins. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system. The Vigil@nce vulnerability database contains several thousand vulnerabilities.