Lucene search

K
archlinuxArchLinuxASA-201705-8
HistoryMay 09, 2017 - 12:00 a.m.

[ASA-201705-8] flashplugin: arbitrary code execution

2017-05-0900:00:00
security.archlinux.org
13

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.513 Medium

EPSS

Percentile

97.5%

Arch Linux Security Advisory ASA-201705-8

Severity: Critical
Date : 2017-05-09
CVE-ID : CVE-2017-3068 CVE-2017-3069 CVE-2017-3070 CVE-2017-3071
CVE-2017-3072 CVE-2017-3073 CVE-2017-3074
Package : flashplugin
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-265

Summary

The package flashplugin before version 25.0.0.171-1 is vulnerable to
arbitrary code execution.

Resolution

Upgrade to 25.0.0.171-1.

pacman -Syu “flashplugin>=25.0.0.171-1”

The problems have been fixed upstream in version 25.0.0.171.

Workaround

None.

Description

  • CVE-2017-3068 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the Advanced Video Coding engine of Adobe Flash Player <
25.0.0.171.

  • CVE-2017-3069 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the BlendMode class of Adobe Flash Player < 25.0.0.171.

  • CVE-2017-3070 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the ConvolutionFilter class of Adobe Flash Player <
25.0.0.171.

  • CVE-2017-3071 (arbitrary code execution)

A use-after-free vulnerability that could lead to code execution has
been found in Adobe Flash Player < 25.0.0.171, when masking display
object.

  • CVE-2017-3072 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the BitmapData class of Adobe Flash Player < 25.0.0.171.

  • CVE-2017-3073 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in Adobe Flash Player < 25.0.0.171, when handling multiple mask
properties of display objects.

  • CVE-2017-3074 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the Graphics class of Adobe Flash Player < 25.0.0.171.

Impact

A remote attacker can execute arbitrary code on the affected host.

References

https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
https://security.archlinux.org/CVE-2017-3068
https://security.archlinux.org/CVE-2017-3069
https://security.archlinux.org/CVE-2017-3070
https://security.archlinux.org/CVE-2017-3071
https://security.archlinux.org/CVE-2017-3072
https://security.archlinux.org/CVE-2017-3073
https://security.archlinux.org/CVE-2017-3074

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyflashplugin< 25.0.0.171-1UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.513 Medium

EPSS

Percentile

97.5%