Risk | Critical |
Patch available | YES |
Number of vulnerabilities | 17 |
CVE-ID | CVE-2015-3040 CVE-2015-3044 CVE-2015-3039 CVE-2015-0359 CVE-2015-0358 CVE-2015-0357 CVE-2015-3043 CVE-2015-0356 CVE-2015-0354 CVE-2015-0353 CVE-2015-0352 CVE-2015-0351 CVE-2015-0350 CVE-2015-0349 CVE-2015-0348 CVE-2015-0347 CVE-2015-0346 |
CWE-ID | CWE-401 CWE-284 CWE-416 CWE-415 CWE-119 CWE-843 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #4 is available. Vulnerability #7 is being exploited in the wild. |
Vulnerable software |
Adobe AIR Client/Desktop applications / Multimedia software Adobe Flash Player for Linux Client/Desktop applications / Plugins for browsers, ActiveX components Adobe Flash Player Client/Desktop applications / Plugins for browsers, ActiveX components |
Vendor | Adobe |
Security Bulletin
This security bulletin contains information about 17 vulnerabilities.
EUVDB-ID: #VU5410
Risk: Low
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2015-3040
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass address space layout randomization on the target system.
The weakness exists due to multiple memory leaks. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and gain unauthorized access to the system.
Successful exploitation of the vulnerability results in security bypass on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5409
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2015-3044
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to insufficient access control. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, bypass security restrictions and gain access to important data.
Successful exploitation results in information disclosure on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5408
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-3039
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to use-after-free error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5407
Risk: High
CVSSv4.0: 8.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2015-0359
CWE-ID:
CWE-415 - Double Free
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to double-free error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.
EUVDB-ID: #VU5406
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0358
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to use-after-free error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5405
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2015-0357
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass address space layout randomization on the target system.
The weakness exists due to multiple memory leaks. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and gain access to sensitive information.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5404
Risk: Critical
CVSSv4.0: 8.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red]
CVE-ID: CVE-2015-3043
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU5403
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0356
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to type confusion error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5402
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0354
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5401
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0353
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5400
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0352
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5399
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0351
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to use-after-free error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5398
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0350
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5397
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0349
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to use-after-free error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5396
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0348
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to buffer overflow. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5395
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0347
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU5394
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2015-0346
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to double-free error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Mitigation
Install update from vendor's website.
Adobe AIR: 13.0.0.83 - 17.0.0.172
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.616
Adobe Flash Player: 11.5.502.146 - 17.0.0.169
CPE2.3https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.