The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Adobe Flash Player: multiple vulnerabilities

Synthesis of the vulnerability 

An attacker can use several vulnerabilities of Adobe Flash Player.
Vulnerable products: Flash Player, Edge EdgeHTML, IE, Windows 10, Windows 2012, Windows 2016, Windows 8, Windows RT, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity of this weakness: 4/4.
Number of vulnerabilities in this bulletin: 13.
Creation date: 14/02/2017.
Revision date: 17/02/2017.
Références of this bulletin: 1007, 1008, 1013, 1018, 4010250, APSB17-04, CERTFR-2017-AVI-051, CERTFR-2017-AVI-055, CVE-2017-2982, CVE-2017-2984, CVE-2017-2985, CVE-2017-2986, CVE-2017-2987, CVE-2017-2988, CVE-2017-2990, CVE-2017-2991, CVE-2017-2992, CVE-2017-2993, CVE-2017-2994, CVE-2017-2995, CVE-2017-2996, MS17-005, RHSA-2017:0275-01, SUSE-SU-2017:0523-1, VIGILANCE-VUL-21834, ZDI-17-109, ZDI-17-110, ZDI-17-287.

Description of the vulnerability 

Several vulnerabilities were announced in Adobe Flash Player.

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2995, ZDI-17-109]

An attacker can generate an integer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2987]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2982]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2985]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2993]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2994, ZDI-17-110, ZDI-17-287]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2986]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2992]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2984]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2988]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2990]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2991]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2996]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This threat announce impacts software or systems such as Flash Player, Edge EdgeHTML, IE, Windows 10, Windows 2012, Windows 2016, Windows 8, Windows RT, RHEL, SUSE Linux Enterprise Desktop, SLES.

Our Vigil@nce team determined that the severity of this cybersecurity alert is critical.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 13 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a specialist ability can exploit this security alert.

Solutions for this threat 

Adobe Flash Player: version 24.0.0.221.
The version 24.0.0.221 is fixed:
  https://get.adobe.com/flashplayer/

RHEL 6.8: new flash-plugin packages.
New packages are available:
  RHEL 6: flash-plugin 24.0.0.221-1.el6_8

SUSE LE 12 SP1: new flash-player packages.
New packages are available:
  SUSE LE 12 SP1: flash-player 24.0.0.221-158.1

Windows: patch for Adobe Flash Player.
A patch is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an applications vulnerabilities alert. The technology watch team tracks security threats targeting the computer system.