Microsoft Windows update for Adobe Flash

Published: 2018-11-13 | Updated: 2018-11-13
Severity Low
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2018-15978
CWE ID CWE-125
Exploitation vector Network
Public exploit N/A
Vulnerable software Adobe Flash Player Subscribe
Vendor Microsoft

Security Advisory

This security advisory describes one low risk vulnerability.

1) Out-of-bounds read

Severity: Low

CVSSv3: 3.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-15978

CWE-ID: CWE-125 - Out-of-bounds Read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to out-of-bounds read when handling malicious input. A remote attacker can trick the victim into opening a specially crafted .swf file, trigger memory corruption and gain access to potentially sensitive information.

Mitigation

Install updates from Microsoft website.

Vulnerable software versions

Adobe Flash Player: on Windows 8.1 for 32-bit systems, on Windows 8.1 for x64-based systems, on Windows 10 for 32-bit Systems, on Windows 10 for x64-based Systems, on Windows 10 Version 1607 for 32-bit Systems, on Windows 10 Version 1607 for x64-based Systems, on Windows 10 Version 1703 for 32-bit Systems, on Windows 10 Version 1703 for x64-based Systems, on Windows 10 Version 1709 for 32-bit Systems, on Windows 10 Version 1709 for 64-based Systems, on Windows 10 Version 1709 for ARM64-based Systems, on Windows 10 Version 1803 for 32-bit Systems, on Windows 10 Version 1803 for ARM64-based Systems, on Windows 10 Version 1809 for 32-bit Systems, on Windows 10 Version 1809 for ARM64-based Systems, on Windows 10 Version 1809 for x64-based Systems, on Windows RT 8.1, on Windows Server 2012, on Windows Server 2012 R2, on Windows Server 2016

CPE External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180025

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.