A critical vulnerability (CVE-2018-4878) exists in Adobe Flash Player 184.108.40.206 and earlier versions. Successful exploitation could potentially allow an attacker to take control of the affected system.
Adobe is aware of a report that an exploit for CVE-2018-4878 exists in the wild, and is being used in limited, targeted attacks against Windows users. These attacks leverage Office documents with embedded malicious Flash content distributed via email.
Adobe will address this vulnerability in a release planned for the week of February 5.
For the latest information, users may monitor the Adobe Product Security Incident Response Team blog.
|Adobe Flash Player Desktop Runtime||220.127.116.11 and earlier versions||Windows, Macintosh|
|Adobe Flash Player for Google Chrome||18.104.22.168 and earlier versions||Windows, Macintosh, Linux and Chrome OS|
|Adobe Flash Player for Microsoft Edge and Internet Explorer 11||22.214.171.124 and earlier versions||Windows 10 and 8.1|
|Adobe Flash Player Desktop Runtime||126.96.36.199 and earlier versions||Linux|
To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right- click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Beginning with Flash Player 27, administrators have the ability to change Flash Player's behavior when running on Internet Explorer on Windows 7 and below by prompting the user before playing SWF content. For more details, see this administration guide.
Administrators may also consider implementing Protected View for Office. Protected View opens a file marked as potentially unsafe in Read-only mode.
|Vulnerability Category||Vulnerability Impact||Severity||CVE Number|
|Use-after-free||Remote Code Execution||Critical||CVE-2018-4878|
Adobe would like to thank KrCERT/CC for reporting this issue and for working with Adobe to help protect our customers.