Security updates available for Adobe Flash Player
Release date: December 13, 2016
Vulnerability identifier: APSB16-39
Priority: See table below
CVE number: CVE-2016-7867, CVE-2016-7868, CVE-2016-7869, CVE-2016-7870, CVE-2016-7871, CVE-2016-7872, CVE-2016-7873, CVE-2016-7874, CVE-2016-7875, CVE-2016-7876, CVE-2016-7877, CVE-2016-7878, CVE-2016-7879, CVE-2016-7880, CVE-2016-7881, CVE-2016-7890, CVE-2016-7892
Platform: Windows, Macintosh, Linux and Chrome OS
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
Adobe is aware of a report that an exploit for CVE-2016-7892 exists in the wild, and is being used in limited, targeted attacks against users running Internet Explorer (32-bit) on Windows.
Product | Affected Versions | Platform |
---|---|---|
Adobe Flash Player Desktop Runtime | 23.0.0.207 and earlier | Windows and Macintosh |
Adobe Flash Player for Google Chrome | 23.0.0.207 and earlier | Windows, Macintosh, Linux and Chrome OS |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 | 23.0.0.207 and earlier | Windows 10 and 8.1 |
Adobe Flash Player for Linux | 11.2.202.644 and earlier | Linux |
- To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Product | Updated Versions | Platform | Priority rating | Availability |
---|---|---|---|---|
Adobe Flash Player Desktop Runtime | 24.0.0.186 | Windows and Macintosh | 1 | Flash Player Download CenterFlash Player Distribution |
Adobe Flash Player for Google Chrome | 24.0.0.186 | Windows, Macintosh, Linux and Chrome OS | 1 | Google Chrome Releases |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 | 24.0.0.186 | Windows 10 and 8.1 | 1 | Microsoft Security Advisory |
Adobe Flash Player for Linux | 24.0.0.186 | Linux | 3 | Flash Player Download Center |
- Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows and Macintosh update to 24.0.0.186 via the update mechanism within the product [1] or by visiting the Adobe Flash Player Download Center.
- Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 24.0.0.186 by visiting the Adobe Flash Player Download Center.
- Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 24.0.0.186 for Windows, Macintosh, Linux and Chrome OS.
- Adobe Flash Player installed with Microsoft Edge and Internet Explorer 11 for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 24.0.0.186.
- Please visit the Flash Player Help page for assistance in installing Flash Player.
[1] Users of Flash Player 11.2.x or later for Windows, or Flash Player 11.3.x or later for Macintosh, who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.
- These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-7872, CVE-2016-7877, CVE-2016-7878, CVE-2016-7879, CVE-2016-7880, CVE-2016-7881, CVE-2016-7892).
- These updates resolve buffer overflow vulnerabilities that could lead to code execution (CVE-2016-7867, CVE-2016-7868, CVE-2016-7869, CVE-2016-7870).
- These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-7871, CVE-2016-7873, CVE-2016-7874, CVE-2016-7875, CVE-2016-7876).
- These updates resolve a security bypass vulnerability (CVE-2016-7890).
- Nicolas Joly of Microsoft Vulnerability Research (CVE-2016-7877)
- Wen Guanxing from Pangu LAB working with Trend Micro's Zero Day Initiative (CVE-2016-7867, CVE-2016-7868)
- willJ of Tencent PC Manager (CVE-2016-7876)
- Saber working with Trend Micro's Zero Day Initiative (CVE-2016-7872)
- JieZeng of Tencent Zhanlu Lab working with the Chromium Vulnerability Rewards Program (CVE-2016-7881)
- kurusu nono working with Trend Micro's Zero Day Initiative (CVE-2016-7879)
- Tao Yan(@Ga1ois) of Palo Alto Networks (CVE-2016-7873, CVE-2016-7874)
- bo13oy of CloverSec Labs working with Trend Micro's Zero Day Initiative (CVE-2016-7875, CVE-2016-7878)
- bo13oy of CloverSec Labs working with Trend Micro's Zero Day Initiative and Tao Yan(@Ga1ois) of Palo Alto Networks (CVE-2016-7871)
- Yuki Chen of the 360 Vulcan Team (CVE-2016-7880)
- WanderingGlitch - Trend Micro Zero Day Initiative working with Trend Micro's Zero Day Initiative (CVE-2016-7869, CVE-2016-7870)
- Paulos Yibelo (CVE-2016-7890)
- Anonymously reported (CVE-2016-7892)
'취약점 정보2' 카테고리의 다른 글
파이어폭스 업데이트 권고 (0) | 2016.12.15 |
---|---|
2016년 12월 Microsoft 보안 공지 요약 (0) | 2016.12.14 |
Apache Tomcat 정보노출 취약점 업데이트 권고 (0) | 2016.12.13 |
Apple Releases Security Updates (애플제품 업데이트 권고) (0) | 2016.12.13 |
McAfee Releases Security Bulletin for Virus Scan Enterprise (0) | 2016.12.13 |