Memory corruption in Adobe products - CVE-2016-4184

 

Memory corruption in Adobe products - CVE-2016-4184

Published: July 12, 2016 / Updated: March 7, 2017


Vulnerability identifier: #VU3747
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2016-4184
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Adobe
Affected software:
Adobe Flash Player Extended Support Release
Adobe Flash Player for Linux
Adobe Flash Player

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error. A remote unauthenticated attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


How to mitigate CVE-2016-4184

Update Adobe Flash Playerto version 22.0.0.209.
Update Adobe Flash Player for Linux to version 11.2.202.632.
Update Adobe Flash Player Extended Support Release to version 18.0.0.366.

Sources