Adobe Security Bulletin

Security updates available for Adobe Flash Player

Release date: July 8, 2015

Last updated: July 17, 2015

Vulnerability identifier: APSB15-16

Priority: See table below

CVE number: CVE-2014-0578, CVE-2015-3097, CVE-2015-3114, CVE-2015-3115, CVE-2015-3116, CVE-2015-3117, CVE-2015-3118, CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, CVE-2015-3123, CVE-2015-3124, CVE-2015-3125, CVE-2015-3126, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3130, CVE-2015-3131, CVE-2015-3132, CVE-2015-3133, CVE-2015-3134, CVE-2015-3135, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4429, CVE-2015-4430, CVE-2015-4431, CVE-2015-4432, CVE-2015-4433, CVE-2015-5116, CVE-2015-5117, CVE-2015-5118, CVE-2015-5119, CVE-2015-5124

Platform: All Platforms

Summary

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe is aware of a report that an exploit targeting CVE-2015-5119 has been publicly published. 

Affected Versions

Product Affected Versions Platform
Adobe Flash Player Desktop Runtime 18.0.0.194 and earlier
Windows and Macintosh
Adobe Flash Player Extended Support Release 13.0.0.296 and earlier Windows and Macintosh
Adobe Flash Player for Google Chrome  18.0.0.194 and earlier Windows, Macintosh and Linux
Adobe Flash Player for Internet Explorer 10 and Internet Explorer 11 18.0.0.194 and earlier Windows 8.0 and 8.1
Adobe Flash Player 11.2.202.468 and earlier Linux
AIR Desktop Runtime 18.0.0.144 and earlier Windows and Macintosh
AIR SDK 18.0.0.144 and earlier Windows, Macintosh, Android and iOS
AIR SDK & Compiler 18.0.0.144 and earlier Windows, Macintosh, Android and iOS
  • To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.  
  • To verify the version of Adobe AIR installed on your system, follow the instructions in the Adobe AIR TechNote

Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:

Product Updated Versions Platform Priority
Availability
Flash Player Desktop Runtime
18.0.0.203 Windows and Macintosh
1 Flash Player Download Center  Flash Player Distribution
Flash Player Extended Support Release 13.0.0.302 Windows and Macintosh
1 Extended Support
Flash Player for Linux 11.2.202.481 Linux 3 Flash Player Download Center
Flash Player for Google Chrome 18.0.0.203  Windows and Macintosh    1 Google Chrome Releases
Flash Player for Google Chrome 18.0.0.204 Linux 3 Google Chrome Releases
Flash Player for Internet Explorer 10 and Internet Explorer 11 18.0.0.203 Windows 8.0 and 8.1
1 Microsoft Security Advisory
AIR Desktop Runtime 18.0.0.180 Windows and Macintosh 3 AIR Download Center
AIR SDK 18.0.0.180 Windows, Macintosh, Android and iOS 3 AIR SDK Download
AIR SDK & Compiler 18.0.0.180 Windows, Macintosh, Android and iOS 3 AIR SDK Download
  • Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows and Macintosh update to Adobe Flash Player 18.0.0.203 by visiting the Adobe Flash Player Download Center or via the update mechanism within the product when prompted [1].
  • Adobe recommends users of the Adobe Flash Player Extended Support Release [2] update to version 13.0.0.302 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html.
  • Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.481 by visiting the Adobe Flash Player Download Center.
  • Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 18.0.0.203 on Windows and Macintosh, and Flash Player 18.0.0.204 on Linux.
  • Adobe Flash Player installed with Internet Explorer for Windows 8.x will be automatically updated to the latest version, which will include Adobe Flash Player 18.0.0.203.
  • Please visit the Flash Player Help page for assistance in installing Flash Player.
 
[1] Users of Flash Player 11.2.x or later for Windows, or Flash Player 11.3.x or later for Macintosh, who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.
 
[2] Note: Beginning August 11, 2015, Adobe will update the version of the "Extended Support Release" from Flash Player 13 to Flash Player 18 for Macintosh and Windows. To stay current with all available security updates, users must install version 18 of the Flash Player Extended Support Release or update to the most recent available version. For full details, please see this blog post: http://blogs.adobe.com/flashplayer/2015/05/upcoming-changes-to-flash-players-extended-support-release-2.html

Vulnerability Details

  • These updates improve memory address randomization of the Flash heap for the Window 7 64-bit platform (CVE-2015-3097).
  • These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-3135, CVE-2015-4432, CVE-2015-5118).
  • These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, CVE-2015-4431, CVE-2015-5124).
  • These updates resolve null pointer dereference issues (CVE-2015-3126, CVE-2015-4429).
  • These updates resolve a security bypass vulnerability that could lead to information disclosure (CVE-2015-3114).
  • These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, CVE-2015-4433).
  • These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-3118, CVE-2015-3124, CVE-2015-5117, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, CVE-2015-5119).
  • These updates resolve vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116).

Acknowledgments

Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:

  • Ben Hawkes of Google Project Zero (CVE-2015-4430)
  • bilou, working with the Chromium Vulnerability Rewards Program (CVE-2015-3118, CVE-2015-3128)
  • Chris Evans of Google Project Zero (CVE-2015-3097, CVE-2015-5118)
  • Chris Evans, Ben Hawkes, Mateusz Jurczyk of Google Project Zero (CVE-2015-4432)
  • David Kraftsow (dontsave) working with HP's Zero Day Initiative (CVE-2015-3125)
  • instruder of Alibaba Security Threat Information (CVE-2015-3133)
  • Kai Kang of Tencent's Xuanwu Lab (CVE-2015-4429, CVE-2015-5124)
  • Kai Lu of Fortinet's FortiGuard Labs (CVE-2015-3117)
  • Jihui Lu of KEEN Team (CVE-2015-3124)
  • Malte Batram (CVE-2015-3115, CVE-2015-3116)
  • Mateusz Jurczyk of Google Project Zero (CVE-2015-3123)
  • Natalie Silvanovich of Google Project Zero (CVE-2015-3130, CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, CVE-2015-4433, CVE-2015-5117, CVE-2015-3127, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428)
  • Soroush Dalili from NCC Group (CVE-2015-3114, CVE-2014-0578)
  • willJ of Tencent PC Manager (CVE-2015-3126)
  • Yuki Chen of Qihoo 360 Vulcan Team (CVE-2015-3134, CVE-2015-3135, CVE-2015-4431)
  • Zręczny Gamoń (CVE-2015-5116)
  • Google Project Zero and Morgan Marquis-Boire (CVE-2015-5119)

Revisions

July 17, 2015: Updated to include an additional CVE (CVE-2015-5124) resolved in these updates but inadvertently omitted from the bulletin.