[manjaro-security] [arch-security] [ASA-201705-8] flashplugin: arbitrary code execution
Remi Gacogne
rgacogne at archlinux.org
Wed May 10 18:39:22 CEST 2017
Arch Linux Security Advisory ASA-201705-8
=========================================
Severity: Critical
Date : 2017-05-09
CVE-ID : CVE-2017-3068 CVE-2017-3069 CVE-2017-3070 CVE-2017-3071
CVE-2017-3072 CVE-2017-3073 CVE-2017-3074
Package : flashplugin
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-265
Summary
=======
The package flashplugin before version 25.0.0.171-1 is vulnerable to
arbitrary code execution.
Resolution
==========
Upgrade to 25.0.0.171-1.
# pacman -Syu "flashplugin>=25.0.0.171-1"
The problems have been fixed upstream in version 25.0.0.171.
Workaround
==========
None.
Description
===========
- CVE-2017-3068 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in the Advanced Video Coding engine of Adobe Flash Player <
25.0.0.171.
- CVE-2017-3069 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in the BlendMode class of Adobe Flash Player < 25.0.0.171.
- CVE-2017-3070 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in the ConvolutionFilter class of Adobe Flash Player <
25.0.0.171.
- CVE-2017-3071 (arbitrary code execution)
A use-after-free vulnerability that could lead to code execution has
been found in Adobe Flash Player < 25.0.0.171, when masking display
object.
- CVE-2017-3072 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in the BitmapData class of Adobe Flash Player < 25.0.0.171.
- CVE-2017-3073 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in Adobe Flash Player < 25.0.0.171, when handling multiple mask
properties of display objects.
- CVE-2017-3074 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in the Graphics class of Adobe Flash Player < 25.0.0.171.
Impact
======
A remote attacker can execute arbitrary code on the affected host.
References
==========
https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
https://security.archlinux.org/CVE-2017-3068
https://security.archlinux.org/CVE-2017-3069
https://security.archlinux.org/CVE-2017-3070
https://security.archlinux.org/CVE-2017-3071
https://security.archlinux.org/CVE-2017-3072
https://security.archlinux.org/CVE-2017-3073
https://security.archlinux.org/CVE-2017-3074
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20170510/bfebfc61/attachment.sig>
More information about the manjaro-security
mailing list