Red Hat Bugzilla – Bug 1335058
flash-plugin: multiple code execution issues fixed in APSB16-15
Last modified: 2016-06-06 03:29:21 EDT
Adobe released a new security advisory for Adobe Flash Player. A critical vulnerability (CVE-2016-4117) exists in Adobe Flash Player 21.0.0.226 and earlier versions for Windows, Macintosh, Linux, and Chrome OS. Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system. Adobe is aware of a report that an exploit for CVE-2016-4117 exists in the wild. Adobe will address this vulnerability in our monthly security update, which will be available as early as May 12. For the latest information, users may monitor the Adobe Product Security Incident Response Team blog. https://helpx.adobe.com/security/products/flash-player/apsa16-02.html
Updates for Adobe Flash Player were released, further details are in the APSB16-15 bulletin. Adobe Security Bulletin APSB16-15 for Adobe Flash Player describes multiple flaws that can possibly lead to code execution when Flash Player is used to play a specially crafted SWF file. Quoting from the APSB16-15: These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2016-1105, CVE-2016-4117). These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-1097, CVE-2016-1106, CVE-2016-1107, CVE-2016-1108, CVE-2016-1109, CVE-2016-1110, CVE-2016-4108, CVE-2016-4110). These updates resolve a heap buffer overflow vulnerability that could lead to code execution (CVE-2016-1101). These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2016-1103). These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-1096, CVE-2016-1098, CVE-2016-1099, CVE-2016-1100, CVE-2016-1102, CVE-2016-1104, CVE-2016-4109, CVE-2016-4111, CVE-2016-4112, CVE-2016-4113, CVE-2016-4114, CVE-2016-4115). These updates resolve a vulnerability in the directory search path used to find resources that could lead to code execution (CVE-2016-4116). External References: https://helpx.adobe.com/security/products/flash-player/apsb16-15.html https://helpx.adobe.com/security/products/flash-player/apsa16-02.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Supplementary Red Hat Enterprise Linux 5 Supplementary Via RHSA-2016:1079 https://rhn.redhat.com/errata/RHSA-2016-1079.html
Adobe updated the advisory with two additional CVEs. I am adding them as aliases for this update. Tomas, do we need to reflect these changes anywhere else? https://helpx.adobe.com/security/products/flash-player/apsb16-15.html CVE-2016-4120 is a memory corruption vulnerability possibly leading to code execution. CVE-2016-4121 is a use-after-free vulnerability possibly leading to code execution.
Adobe updated the advisory with four additional CVEs. Adding them as aliases and adding them to errata. https://helpx.adobe.com/security/products/flash-player/apsb16-15.html CVE-2016-4160, CVE-2016-4161, CVE-2016-4162, CVE-2016-4163: These updates resolve memory corruption vulnerabilities that could lead to code execution.