Microsoft Windows update for Adobe Flash

Published: 2019-02-12
Severity Low
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2019-7090
CWE ID CWE-125
Exploitation vector Network
Public exploit N/A
Vulnerable software Adobe Flash Player Subscribe
Vendor Microsoft

Security Advisory

This security advisory describes one low risk vulnerability.

1) Out-of-bounds read

Severity: Low

CVSSv3: 5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2019-7090

CWE-ID: CWE-125 - Out-of-bounds Read

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to boundary error when processing SWF files. A remote attacker can create a specially crafted SWF document, trick the victim into opening it, trigger out-of-bounds read error and gain access to sensitive information.

Mitigation

Install updates from Microsoft website.

Vulnerable software versions

Adobe Flash Player: on Windows 8.1 for 32-bit systems, on Windows 8.1 for x64-based systems, on Windows 10 for 32-bit Systems, on Windows 10 for x64-based Systems, on Windows 10 Version 1607 for 32-bit Systems, on Windows 10 Version 1607 for x64-based Systems, on Windows 10 Version 1703 for 32-bit Systems, on Windows 10 Version 1703 for x64-based Systems, on Windows 10 Version 1709 for 32-bit Systems, on Windows 10 Version 1709 for 64-based Systems, on Windows 10 Version 1709 for ARM64-based Systems, on Windows 10 Version 1803 for 32-bit Systems, on Windows 10 Version 1803 for ARM64-based Systems, on Windows 10 Version 1809 for 32-bit Systems, on Windows 10 Version 1809 for ARM64-based Systems, on Windows 10 Version 1809 for x64-based Systems, on Windows RT 8.1, on Windows Server 2012, on Windows Server 2012 R2, on Windows Server 2016, on Windows Server 2019

CPE External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190003

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.