The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of Adobe Flash Player: out-of-bounds memory reading

Synthesis of the vulnerability

An attacker can force a read at an invalid address of Adobe Flash Player, in order to trigger a denial of service, or to obtain sensitive information.
Severity of this computer vulnerability: 2/4.
Creation date: 14/11/2018.
Références of this announce: APSB18-39, CERTFR-2018-AVI-548, CVE-2018-15978, RHSA-2018:3618-01, VIGILANCE-VUL-27766.

Description of the vulnerability

An attacker can force a read at an invalid address of Adobe Flash Player, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

This computer weakness bulletin impacts software or systems such as Flash Player, Windows 10, Windows 2012, Windows 2016, Windows 8, Windows RT, RHEL.

Our Vigil@nce team determined that the severity of this computer threat announce is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this threat announce.

Solutions for this threat

Adobe Flash Player: version 31.0.0.148.
The version 31.0.0.148 is fixed:
  https://get.adobe.com/flashplayer/

RHEL 6.10: new flash-plugin packages.
New packages are available:
  RHEL 6: flash-plugin 31.0.0.148-1.el6_10

Windows: patch for Adobe Flash Player.
A patch is indicated in information sources.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides software vulnerability bulletins. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.