Menu
Hackers exploit unpatched Flash Player vulnerability, Adobe warns

Hackers exploit unpatched Flash Player vulnerability, Adobe warns

The company releases updates for Reader, Acrobat and ColdFusion, but is still working on the Flash Player patch

Adobe Systems is working on a patch for a critical vulnerability in Flash Player that hackers are already exploiting in attacks. In the meantime, the company has released other security patches for Reader, Acrobat, and ColdFusion.

The Flash Player vulnerability is being tracked as CVE-2016-4117 and affects Flash Player versions 21.0.0.226 and earlier for Windows, OS X, Linux, and Chrome OS. Successful exploitation can allow attackers to take control of affected systems.

"Adobe is aware of a report that an exploit for CVE-2016-4117 exists in the wild," the company said in an advisory published Tuesday. "Adobe will address this vulnerability in our monthly security update, which will be available as early as May 12."

Also Tuesday, Adobe released updates for Reader and Acrobat that fix 92 vulnerabilities, the majority of which are rated critical and can result in arbitrary code execution.

The affected versions include Acrobat DC and Reader DC 15.010.20060 and earlier versions, 15.006.30121 and earlier versions, as well as Acrobat XI and Reader XI 11.0.15 and earlier versions. Users can update their product installations manually by choosing Help > Check for Updates.

Adobe also released updates for its ColdFusion application server. These updates address an input validation issue that could lead to cross-site scripting attacks, a host name verification problem affecting wild card certificates, and a Java deserialization vulnerability in the Apache Commons Collections library.

Adobe advises users to install ColdFusion (2016 release) Update 1, ColdFusion 11 Update 8, or ColdFusion 10 Update 19, depending on which version they use.

ColdFusion installations are sometimes targeted by attackers. In 2013, researchers documented an attack where hackers exploited a ColdFusion vulnerability to install malware on Microsoft IIS servers.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Brand Post

Featured

Slideshows

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

Hundreds of leaders from the New Zealand IT industry gathered at the Hilton in Auckland on 17 November to celebrate the finest female talent in the Kiwi channel and recognise the winners of the Reseller News Women in ICT Awards (WIICTA) 2020.

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards
Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

The leading female front runners of the New Zealand ICT industry joined together for the annual Reseller News Women in ICT Awards event at the Hilton in Auckland, during which hundreds of guests celebrated 13 outstanding individuals who won awards, chosen from more than 50 finalists representing over 30 organisations.

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards
Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners

Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners

More than 500 channel leaders gathered in Auckland on 21 October at the ​Reseller News Innovation Awards ​2020 to celebrate the achievements of the New Zealand technology industry's top partners, start-ups, vendors, distributors and individuals.

Channel gathers to celebrate the Reseller News Innovation Awards 2020 winners
Show Comments