Adobe Security Bulletin

Security updates available for Adobe Flash Player

Release date: September 13, 2016

Last updated: October 4, 2016

Vulnerability identifier: APSB16-29

Priority: See table below

CVE number: CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932

Platform: Windows, Macintosh, Linux and ChromeOS

Summary

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS.  These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.  

Affected Versions

Product

Affected Versions

Platform

Adobe Flash Player Desktop Runtime

22.0.0.211 and earlier

Windows and Macintosh

Adobe Flash Player Extended Support Release

18.0.0.366 and earlier

Windows and Macintosh

Adobe Flash Player for Google Chrome

22.0.0.211 and earlier

Windows, Macintosh, Linux and ChromeOS

Adobe Flash Player for Microsoft Edge and Internet Explorer 11

22.0.0.211 and earlier

Windows 10 and 8.1

Adobe Flash Player for Linux

11.2.202.632 and earlier

Linux

  • To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.  

Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:

Product

Updated Versions

Platform

Priority rating

Availability

Adobe Flash Player Desktop Runtime

23.0.0.162

Windows and Macintosh

1

Adobe Flash Player Extended Support Release

18.0.0.375

Windows and Macintosh

1

Adobe Flash Player for Google Chrome

23.0.0.162

Windows, Macintosh, Linux and ChromeOS  

1

Adobe Flash Player for Microsoft Edge and Internet Explorer 11

23.0.0.162

Windows 10 and 8.1

1

Adobe Flash Player for Linux

11.2.202.635

Linux

3

  • Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows and Macintosh update to 23.0.0.162 via the update mechanism within the product when prompted [1], or by visiting the Adobe Flash Player Download Center.
  • Adobe recommends users of the Adobe Flash Player Extended Support Release should update to version 18.0.0.375 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html.
  • Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.635 by visiting the Adobe Flash Player Download Center.
  • Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 23.0.0.162 for Windows, Macintosh, Linux and Chrome OS.
  • Adobe Flash Player installed with Microsoft Edge and Internet Explorer for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 23.0.0.162.
  • Please visit the Flash Player Help page for assistance in installing Flash Player.

[1] Users of Flash Player 11.2.x or later for Windows, or Flash Player 11.3.x or later for Macintosh, who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.

Vulnerability Details

  • These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2016-4287). 
  • These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932). 
  • These updates resolve security bypass vulnerabilities that could lead to information disclosure (CVE-2016-4271, CVE-2016-4277, CVE-2016-4278). 
  • These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, CVE-2016-6924).

Acknowledgments

  • Weizhong Qian of ART&UESTC's Neklab (CVE-2016-4280) 
  • Mumei working with Trend Micro's Zero Day Initiative (CVE-2016-4279) 
  • Leone Pontorieri and Björn Ruytenberg (CVE-2016-4271) 
  • Mateusz Jurczyk and Natalie Silvanovich of Google Project Zero (CVE-2016-4274, CVE-2016-4275) 
  • Soroush Dalili and Matthew Evans from NCC Group (CVE-2016-4277) 
  • Yuki Chen of Qihoo 360 Vulcan Team working with the Chromium Vulnerability Rewards Program (CVE-2016-6925, CVE-2016-6926) 
  • willJ of Tencent PC Manager (CVE-2016-6923, CVE-2016-6924) 
  • JieZeng of Tencent Zhanlu Lab working with the Chromium Vulnerability Rewards Program (CVE-2016-6927, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932) 
  • Nicolas Joly of Microsoft Vulnerability Research (CVE-2016-4272, CVE-2016-4278) 
  • Yuki Chen of Qihoo 360 Vulcan Team (CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6929) 
  • b0nd@garage4hackers working with Trend Micro's Zero Day Initiative (CVE-2016-4276) 
  • Tao Yan (@Ga1ois) of Palo Alto Networks (CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285)

Revisions

September 13, 2016: Removed CVE-2016-4182, CVE-2016-4237 and CVE-2016-4238, which were inadvertently included in the original version of this bulletin. 

October 4, 2016: Added Björn Ruytenberg to the Acknowledgments section.  

Adobe logo

Sign in to your account

[Feedback V2 Badge]