Risk | High |
Patch available | YES |
Number of vulnerabilities | 12 |
CVE-ID | CVE-2016-4273 CVE-2016-4286 CVE-2016-6981 CVE-2016-6982 CVE-2016-6983 CVE-2016-6984 CVE-2016-6985 CVE-2016-6986 CVE-2016-6987 CVE-2016-6989 CVE-2016-6990 CVE-2016-6992 |
CWE-ID | CWE-119 CWE-284 CWE-416 CWE-843 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
Adobe Flash Player Extended Support Release Client/Desktop applications / Plugins for browsers, ActiveX components Adobe Flash Player for Linux Client/Desktop applications / Plugins for browsers, ActiveX components Adobe Flash Player Client/Desktop applications / Plugins for browsers, ActiveX components |
Vendor | Adobe |
Security Bulletin
This security bulletin contains information about 12 vulnerabilities.
EUVDB-ID: #VU950
Risk: High
CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2016-4273
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU958
Risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-4286
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to access control error. A remote attacker can create a specially crafted Web site, trick the victim into opening it, to avoid security controls and obtain potentially sensitive information.
Successful exploitation of the vulnerability may result in information disclosure on the vulnerable system.
Update the affected packages.
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU948
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-6981
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to use-after-free error when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU951
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-6982
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU952
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-6983
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU953
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-6984
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU954
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-6985
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU955
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-6986
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU949
Risk: High
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-6987
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to use-after-free memory error within Accessibility's sendEvent method when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU956
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-6989
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU957
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-6990
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU947
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-6992
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to type confusion error when handling malicious .swf content. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability will result in arbitrary code execution on the vulnerable system.
Update the affected packages.
Adobe Flash Player: 19.0.0.185 - 23.0.0.185
Adobe Flash Player for Linux: 11.2.202.238 - 11.2.202.637
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.382
CPE2.3http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00024.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.