Adobe has issued an important security update which patches a total of 23 critical vulnerabilities in Flash Player.
On Monday, Adobe issued the firm's latest set of security updates, specifically targeting the Adobe Flash Player. The updates for Windows, Mac and Linux users address "critical vulnerabilities that could potentially allow an attacker to take control of the affected system," according to the software developer.
Adobe Flash Player Desktop Runtime and Adobe Flash Player Extended Support Release 220.127.116.11 and earlier, Adobe Flash Player for Google Chrome 18.104.22.168 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 22.214.171.124 and earlier on Windows 10 and Adobe Flash Player for Internet Explorer 10 and 11 126.96.36.199 and earlier on Windows 8 and 8.1 are all impacted, as well as Adobe Flash Player for Linux versions 188.8.131.52 and earlier.
In addition, AIR Desktop Runtime 184.108.40.206 and earlier for Windows and Mac, AIR SDK 220.127.116.11 and AIR SDK & compiler 18.104.22.168 and earlier on Windows, Android and iOS and AIR for Android 22.214.171.124 and earlier are affected by this update.
The security flaws fixed in this update, all deemed critical, include a type confusion vulnerability, use-after-free flaws, buffer overflow issues and memory corruption vulnerabilities which could lead to remote code execution.
The update also resolves memory leak security flaws, stack corruption and stack overflow vulnerabilities as well as a security bypass vulnerability which could lead to information disclosure.
In addition, Adobe has added further defense to a mitigation barrier which prevents vector length corruptions, resolved a vulnerability which could be exploited to bypass the same-origin-policy and lead to information leaks and improved validation checks in order to reject content from vulnerable JSONP callback APIs.
Adobe recommends users accept automatic updates for the Chrome and Internet Explorer browsers relating to Flash. Users can also manually download updates from the Download Center. Users of the Adobe Flash Player Extended Support Release are encouraged to update to version 126.96.36.199.
There is an issue brought to light with this update, however. As noted by security expert Brian Krebs, those downloading new installations of Shockwave which bundle Flash are placing themselves at risk if they do not junk the software.
According to Krebs, the bundled Adobe Shockwave Player contains Flash 188.8.131.525, which is many versions behind the current patched version. This version contains a staggering 155 vulnerabilities which leave users completely exposed to backdoors, exploits, remote control and overall system compromise.
Within the security bulletin, Adobe has given credit to the Alibaba Security Research Team, Google Project Zero, HP's Zero Day Initiative, Google's Chrome Rewards Program and AddReality, among others.
Qualys CTO Wolfgang Kandek raised an interesting point in a forum post, noting the surprise update, as it is outside of the normal update cycle, may be due to "potentially disclosure deadlines [..] in play." If this is the case, Adobe has given users time to update before vulnerability details enter the public domain and potentially end up exploited by attackers.
Last month, Adobe fixed two critical flaws in Flash which were discovered due to the Hacking Team data breach. The exploits, zero-day vulnerabilities which allowed attackers to remotely control a computer, impacted Windows, Mac and Linux machines.
Read on: Top picks
- How to access Wi-Fi anonymously from miles away
- Flic: The wireless button which brings the connected world into your home (hands-on)
- Adblock Plus Google Play exile ends, launches iOS, Android browser
- One password gifts hacker with hundreds of Firefox bugs, vulnerabilities
- Fiat Chrysler recalls 8,000 extra Jeeps over remote control hacking worries