Menu
Adobe patches remote code execution and keylogging flaws in Flash Player

Adobe patches remote code execution and keylogging flaws in Flash Player

Some of the vulnerabilities allow attackers to take full control of users' systems

Adobe Systems fixed nine vulnerabilities in Flash Player that allow attackers to record users' keystrokes or take complete control of their computers.

These are Flash Player updates you'll want to install, unlike the malicious one served from the North Korean news agency site.

The updates, Flash Player 16.0.0.257 for Windows and Mac and Flash Player 11.2.202.429 for Linux, address seven remote code execution vulnerabilities, an information disclosure flaw that can be exploited to capture keystrokes and a lower-risk file validation issue.

The company also included the fixes in its Flash Player Extended Support Release (ESR), an older Flash Player version used by organizations that prefer stability over new functionality. The updated ESR version is 13.0.0.260.

Users of Google Chrome and Internet Explorer on Windows 8 or 8.1 will automatically receive the Flash Player updates through the update mechanisms of those browsers.

Adobe AIR, a framework for developing and running rich Internet applications, has also been updated because it bundles Flash Player. The AIR desktop runtime was updated to version 16.0.0.245, the AIR SDK (Software Development Kit) and Compiler were updated to version 16.0.0.272 and Adobe AIR for Android was updated to version 16.0.0.272.

Outdated Flash Player browser plug-ins are a common target in drive-by download attacks that install malware through silent exploits hosted on compromised websites. Users should always make sure they're running the latest versions of Flash Player, Java, Silverlight, Adobe Reader and other programs that install browser plug-ins.


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags patchesonline safetysecurityAdobe Systemspatch managementExploits / vulnerabilities

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments