[manjaro-security] [arch-security] [ASA-201705-8] flashplugin: arbitrary code execution

Remi Gacogne rgacogne at archlinux.org
Wed May 10 18:39:22 CEST 2017


Arch Linux Security Advisory ASA-201705-8
=========================================

Severity: Critical
Date    : 2017-05-09
CVE-ID  : CVE-2017-3068 CVE-2017-3069 CVE-2017-3070 CVE-2017-3071
          CVE-2017-3072 CVE-2017-3073 CVE-2017-3074
Package : flashplugin
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-265

Summary
=======

The package flashplugin before version 25.0.0.171-1 is vulnerable to
arbitrary code execution.

Resolution
==========

Upgrade to 25.0.0.171-1.

# pacman -Syu "flashplugin>=25.0.0.171-1"

The problems have been fixed upstream in version 25.0.0.171.

Workaround
==========

None.

Description
===========

- CVE-2017-3068 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the Advanced Video Coding engine of Adobe Flash Player <
25.0.0.171.

- CVE-2017-3069 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the BlendMode class of Adobe Flash Player < 25.0.0.171.

- CVE-2017-3070 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the ConvolutionFilter class of Adobe Flash Player <
25.0.0.171.

- CVE-2017-3071 (arbitrary code execution)

A use-after-free vulnerability that could lead to code execution has
been found in Adobe Flash Player < 25.0.0.171, when masking display
object.

- CVE-2017-3072 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the BitmapData class of Adobe Flash Player < 25.0.0.171.

- CVE-2017-3073 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in Adobe Flash Player < 25.0.0.171, when handling multiple mask
properties of display objects.

- CVE-2017-3074 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the Graphics class of Adobe Flash Player < 25.0.0.171.

Impact
======

A remote attacker can execute arbitrary code on the affected host.

References
==========

https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
https://security.archlinux.org/CVE-2017-3068
https://security.archlinux.org/CVE-2017-3069
https://security.archlinux.org/CVE-2017-3070
https://security.archlinux.org/CVE-2017-3071
https://security.archlinux.org/CVE-2017-3072
https://security.archlinux.org/CVE-2017-3073
https://security.archlinux.org/CVE-2017-3074

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20170510/bfebfc61/attachment.sig>


More information about the manjaro-security mailing list