Adobe Security Bulletin

Security updates available for Adobe Flash Player

Release date: April 14, 2015

Last Updated: August 11, 2015

Vulnerability identifier: APSB15-06

Priority: See table below

CVE number: CVE-2015-0346, CVE-2015-0347, CVE-2015-0348, CVE-2015-0349, CVE-2015-0350, CVE-2015-0351, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0356, CVE-2015-0357, CVE-2015-0358, CVE-2015-0359, CVE-2015-0360, CVE-2015-3038, CVE-2015-3039, CVE-2015-3040, CVE-2015-3041, CVE-2015-3042, CVE-2015-3043, CVE-2015-3044 

Platform: All Platforms

Summary

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux.  These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system.  

Adobe is aware of a report that an exploit for CVE-2015-3043 exists in the wild, and recommends users update their product installations to the latest versions: 

  • Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 17.0.0.169. 
  • Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.281. 
  • Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.457. 
  • Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 17.0.0.169 when available. 
  • Users of the Adobe AIR desktop runtime should update to version 17.0.0.172.
  • Users of the Adobe AIR SDK and AIR SDK & Compiler should update to version 17.0.0.172.

Affected software versions

  • Adobe Flash Player 17.0.0.134 and earlier versions
  • Adobe Flash Player 13.0.0.277 and earlier 13.x versions
  • Adobe Flash Player 11.2.202.451 and earlier 11.x versions
  • AIR Desktop Runtime 17.0.0.144 and earlier versions
  • AIR SDK and SDK & Compiler 17.0.0.144 and earlier versions 

To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.

To verify the version of Adobe AIR installed on your system, follow the instructions in the Adobe AIR TechNote.

Solution

Adobe recommends users update their software installations by following the instructions below: 

  • Adobe recommends users of the Adobe Flash Player desktop runtime for Windows and Macintosh update to Adobe Flash Player 17.0.0.169 by visiting the Adobe Flash Player Download Center, or via the update mechanism within the product when prompted. 

  • Adobe recommends users of the Adobe Flash Player Extended Support Release should update to version 13.0.0.281 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html

  • Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.457 by visiting the Adobe Flash Player Download Center

  • Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 17.0.0.169. 

  • Adobe Flash Player installed with Internet Explorer for Windows 8.x will be automatically updated to the latest version when available, which will include Adobe Flash Player 17.0.0.169.

  • Adobe recommends users of the Adobe AIR desktop runtime should update to version 17.0.0.172 by visiting the Adobe AIR Download Center.  

  • Adobe recommends users of the Adobe AIR SDK should update to version 17.0.0.172 by visiting the Adobe AIR Download Center.  

  • Adobe recommends users of the Adobe AIR SDK & Compiler should update to version 17.0.0.172 by visiting the Adobe AIR Download Center.

Priority and severity ratings

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:

Product Affected versions Platform Priority rating
Adobe Flash Player Desktop Runtime 17.0.0.134 and earlier
Windows and Macintosh
1
Adobe Flash Player Extended Support Release 13.0.0.277 and earlier Windows and Macintosh
1
Adobe Flash Player for Google Chrome  17.0.0.134 and earlier Windows, Macintosh and Linux
1
Adobe Flash Player for Internet Explorer 10 and Internet Explorer 11 17.0.0.134 and earlier Windows 8.0 and 8.1 1
Adobe Flash Player 11.2.202.451 and earlier Linux 3
AIR Desktop Runtime 17.0.0.144 and earlier Windows and Macintosh 3
AIR SDK 17.0.0.144 and earlier Windows, Macintosh, Android and iOS 3
AIR SDK & Compiler 17.0.0.144 and earlier Windows, Macintosh, Android and iOS  3

These updates address critical vulnerabilities in the software.

Details

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux.  These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. 

Adobe is aware of a report that an exploit for CVE-2015-3043 exists in the wild, and recommends users update their product installations to the latest versions: 

  • Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 17.0.0.169.

  • Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.281.

  • Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.457.

  • Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 17.0.0.169 when available.

  • Users of the Adobe AIR desktop runtime should update to version 17.0.0.172.

  • Users of the Adobe AIR SDK and AIR SDK & Compiler should update to version 17.0.0.172.

These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, CVE-2015-3043). 

These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-0356). 

These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-0348). 

These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-0349, CVE-2015-0351, CVE-2015-0358, CVE-2015-3039). 

These updates resolve double-free vulnerabilities that could lead to code execution (CVE-2015-0346, CVE-2015-0359). 

These updates resolve memory leak vulnerabilities that could be used to bypass ASLR (CVE-2015-0357, CVE-2015-3040).  

These updates resolve a security bypass vulnerability that could lead to information disclosure (CVE-2015-3044). 

Affected Software   Recommended Player Update Availability
Flash Player Desktop Runtime
  17.0.0.169

Flash Player Download Center

Flash Player Distribution

Flash Player Extended Support Release   13.0.0.281 Extended Support
Flash Player for Linux   11.2.202.457 Flash Player Download Center
Flash Player for Google Chrome   17.0.0.169 Google Chrome Releases
Flash Player for Internet Explorer 10 and Internet Explorer 11   17.0.0.169
Microsoft Security Advisory
AIR Desktop Runtime   17.0.0.172 AIR Download Center
AIR SDK   17.0.0.172 AIR SDK Download
AIR SDK & Compiler   17.0.0.172 AIR SDK Download

Acknowledgments

Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:

  • Anonymous (CVE-2015-3043)
  • bilou, working with the Chromium Vulnerability Reward Program (CVE-2015-0357, CVE-2015-0358, CVE-2015-0359)  
  • Chris Evans of Google Project Zero (CVE-2015-0348, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360)

  • instruder of Alibaba Security Research Team (CVE-2015-3038)

  • Jihui Lu of KeenTeam (@K33nTeam), working with the Chromium Vulnerability Reward Program (CVE-2015-0351, CVE-2015-3040, CVE-2015-3041)

  • Jouko Pynnönen of Klikki Oy (CVE-2015-0346, CVE-2015-3044)

  • Michele Spagnuolo of the Google Security Team, and Mark Brand of Google Project Zero (CVE-2015-3042)

  • Natalie Silvanovich, working with Google Project Zero (CVE-2015-0356)

  • Natalie Silvanovich, working with Google Project Zero, and bilou, working with HP's Zero Day Initiative (CVE-2015-3039)

Revisions

May 12, 2015: Added versions of Adobe AIR that address the CVEs referenced in this bulletin. 

July 3, 2015: Added credit to bilou working with HP's Zero Day Initiative for separately reporting CVE-2015-3039.