Lucene search

K
kasperskyKaspersky LabKLA11041
HistoryJun 13, 2017 - 12:00 a.m.

KLA11041 Arbitrary code execution vulnerabilities in Adobe Flash Player

2017-06-1300:00:00
Kaspersky Lab
threats.kaspersky.com
27

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.702 High

EPSS

Percentile

98.0%

Multiple serious vulnerabilities have been found in Adobe Flash Player. Malicious users can exploit these vulnerabilities to execute arbitrary code.

  1. A use-after-free vulnerability related to manipulating the ActionScript 2 XML class can be exploited remotely to execute arbitrary code;
  2. A use-after-free vulnerability related to internal computation that is caused by multiple display object mask manipulations can be exploited remotely to execute arbitrary code;
  3. A use-after-free vulnerability in the Primetime SDK can be exploited remotely to execute arbitrary code;
  4. A use-after-free vulnerability in the advertising metadata functionality can be exploited remotely to execute arbitrary code;
  5. Memory corruption vulnerabilities in the MPEG-4 AVC and in the ATF (Adobe Texture Format) modules can be exploited remotely to execute arbitrary code;
  6. Memory corruption vulnerabilities in the PNG image parser and in the internal representation of raster data can be exploited remotely to execute arbitrary code;
  7. A memory corruption vulnerability in the LocaleID class can be exploited remotely to execute arbitrary code.

Technical details

In case of vulnerability (3), functionality in the Primetime SDK, which is related to the profile metadata of the media stream works improperly.
To update Adobe Flash Player ActiveX (detected as Flash.ocx) on Windows 8 and higher, install latest updates from Control Panel

Original advisories

Adobe Security Bulletin

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Adobe-Flash-Player-ActiveX

Adobe-Flash-Player-NPAPI

Adobe-Flash-Player-PPAPI

CVE list

CVE-2017-3084 critical

CVE-2017-3083 critical

CVE-2017-3082 critical

CVE-2017-3081 critical

CVE-2017-3079 critical

CVE-2017-3078 critical

CVE-2017-3077 critical

CVE-2017-3076 critical

CVE-2017-3075 critical

Solution

Update to the latest versions

Download Adobe Flash Player

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Adobe Flash Player versions earlier thanΒ 26.0.0.126

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.702 High

EPSS

Percentile

98.0%