Menu
Adobe fixes Flash Player flaws that could lead to info theft, malware attacks

Adobe fixes Flash Player flaws that could lead to info theft, malware attacks

The company also released updates for the AIR runtime on Windows, Mac and Android

Adobe Systems fixed 13 security issues in Flash Player that could lead to serious attacks, including remote code execution and information disclosure.

Users should upgrade to Flash Player 18.0.0.160 for Windows and Mac, Adobe Flash Player 11.2.202.466 for Linux, or Flash Player 13.0.0.292 if they are on the extended support release channel.

Users of Internet Explorer on Windows 8.x and Google Chrome on Windows, Linux and Mac will receive the Flash Player update for their respective browser automatically.

Adobe also released updates for the AIR runtime on Windows, Mac and Android, as well AIR SDK and Compiler, because these programs bundle Flash Player.

Six of the new vulnerabilities patched in Flash Player could be exploited to achieve remote code execution. These are the kind of vulnerabilities used in drive-by download attacks launched through compromised websites or malicious ads to install malware on users' computers.

Adobe is not aware that any of the newly-patched vulnerabilities are being actively exploited by attackers. However, history has shown that attackers are quick to target new Flash flaws after a fix becomes available for them. Earlier this year, attackers started exploiting a Flash Player vulnerability just one week after Adobe released a patch for it.

The new Flash updates also fix four vulnerabilities that can be exploited to bypass the same-origin policy, a critical security mechanism in browsers that prevents code running on a website from accessing the content of other websites opened in the same browser. Without it, a rogue website could, for example, harvest the emails of users who have Gmail opened in another tab.

On Tuesday, Adobe again tried to patch a flaw it partially fixed twice before. That fix is for a publicly disclosed attack called the Rosetta Flash for which proof-of-concept exploits exist.

The remaining fixes in the new Flash Player updates address a flaw that can be used to bypass an OS anti-exploitation mechanism called the address space layout randomization (ASLR) and one that can be used to escalate the privilege of the Flash Player broker in Internet Explorer from low to medium integrity level.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags online safetypatchesAdobe SystemsExploits / vulnerabilities

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.‚Äč

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments