Vulnerability identifier: #VU5767
Vulnerability risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Adobe Flash Player
Client/Desktop applications /
Plugins for browsers, ActiveX components
Adobe Flash Player Extended Support Release
Client/Desktop applications /
Plugins for browsers, ActiveX components
Adobe Flash Player for Linux
Client/Desktop applications /
Plugins for browsers, ActiveX components
Adobe AIR
Client/Desktop applications /
Multimedia software
Vendor: Adobe
Description
The vulnerabiity allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to failure to use Address Space Layout Randomization (ASLR). A remote attacker can create a specially crafted Web site, trick the victim into visiting it, conduct a JIT spraying attack and bypass memory layout randomization mitigations.
Successful exploitation of this vulnerability results in security bypass on the vulnerable system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Adobe Flash Player: 20.0.0.228 - 21.0.0.213
Adobe Flash Player Extended Support Release: 18.0.0.268 - 18.0.0.343
Adobe AIR: 21.0.0.176 - 21.0.0.198
Adobe Flash Player for Linux: 11.2.202.332 - 11.2.202.616
External links
http://helpx.adobe.com/security/products/flash-player/apsb16-10.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.