Release date: November 11, 2014
Vulnerability identifier: APSB14-24
Priority: See table below
CVE number: CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577, CVE-2014-0581, CVE-2014-0582, CVE-2014-0583, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8437, CVE-2014-8438, CVE-2014-8440, CVE-2014-8441, CVE-2014-8442
Platform: All Platforms
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions:
- Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 15.0.0.223.
- Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.252.
- Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.418.
- Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x will be automatically updated to the current version.
- Users of the Adobe AIR desktop runtime should update to version 15.0.0.356.
- Users of the Adobe AIR SDK and AIR SDK & Compiler should update to version 15.0.0.356.
- Users of Adobe AIR for Android should update to Adobe AIR 15.0.0.356.
- Adobe Flash Player 15.0.0.189 and earlier versions
- Adobe Flash Player 13.0.0.250 and earlier 13.x versions
- Adobe Flash Player 11.2.202.411 and earlier versions for Linux
- Adobe AIR desktop runtime 15.0.0.293 and earlier versions
- Adobe AIR SDK 15.0.0.302 and earlier versions
- Adobe AIR SDK & Compiler 15.0.0.302 and earlier versions
- Adobe AIR 15.0.0.293 and earlier versions for Android
To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
To verify the version of Adobe AIR installed on your system, follow the instructions in the Adobe AIR TechNote.
Adobe recommends users update their software installations by following the instructions below:
- Adobe recommends users of the Adobe Flash Player desktop runtime for Windows and Macintosh update to Adobe Flash Player 15.0.0.223 by visiting the Adobe Flash Player Download Center, or via the update mechanism within the product when prompted.
- Adobe recommends users of the Adobe Flash Player Extended Support Release should update to version 13.0.0.252 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html.
- Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.418 by visiting the Adobe Flash Player Download Center.
- Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 15.0.0.223.
- Adobe Flash Player installed with Internet Explorer for Windows 8.x will be automatically updated to the latest version, which will include Adobe Flash Player 15.0.0.223.
- Adobe recommends users of the Adobe AIR desktop runtime should update to version 15.0.0.356 by visiting the Adobe AIR Download Center.
- Adobe recommends users of the Adobe AIR SDK should update to version 15.0.0.356 by visiting the Adobe AIR Download Center.
- Adobe recommends users of the Adobe AIR SDK & Compiler should update to version 15.0.0.356 by visiting the Adobe AIR Download Center.
- Adobe recommends users of the Adobe AIR for Android should update to Adobe AIR 15.0.0.356 by downloading the new version from the Google Play store.
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product | Affected versions | Platform | Priority rating |
---|---|---|---|
Adobe Flash Player Desktop Runtime | 15.0.0.189 and earlier |
Windows and Macintosh |
1 |
Adobe Flash Player Extended Support Release | 13.0.0.250 and earlier | Windows and Macintosh |
1 |
Adobe Flash Player for Google Chrome | 15.0.0.189 and earlier | Windows, Macintosh and Linux |
1 |
Adobe Flash Player for Internet Explorer 10 and Internet Explorer 11 | 15.0.0.189 and earlier | Windows 8.0 and 8.1 | 1 |
Adobe Flash Player | 11.2.202.411 and earlier | Linux | 3 |
Adobe AIR Desktop Runtime | 15.0.0.293 and earlier | Windows and Macintosh | 3 |
Adobe AIR for Android | 15.0.0.293 and earlier |
Android |
3 |
Adobe AIR SDK | 15.0.0.302 and earlier |
Windows, Macintosh, Androd and iOS | 3 |
Adobe AIR SDK and Compiler | 15.0.0.302 and earlier |
Windows, Macintosh, Android, and iOS |
3 |
These updates address critical vulnerabilities in the software.
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions:
- Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 15.0.0.223.
- Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.252.
- Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.418.
- Adobe Flash Player installed with Google Chrome, as well as Internet Explorer for Windows 8.x will be automatically updated to the current version.
- Users of the Adobe AIR desktop runtime should update to version 15.0.0.356.
- Users of the Adobe AIR SDK and AIR SDK & Compiler should update to version 15.0.0.356.
- Users of Adobe AIR for Android should update to Adobe AIR 15.0.0.356.
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2014-0573, CVE-2014-0588, CVE-2014-8438).
These updates resolve a double free vulnerability that could lead to code execution (CVE-2014-0574).
These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0590).
These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2014-0582, CVE-2014-0589).
These updates resolve an information disclosure vulnerability that could be exploited to disclose session tokens (CVE-2014-8437).
These updates resolve a heap buffer overflow vulnerability that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-0583).
These updates resolve a permission issue that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-8442).
Affected Software | Recommended Player Update | Availability | |
---|---|---|---|
Flash Player Desktop Runtime |
15.0.0.223 | ||
Flash Player Extended Support Release | 13.0.0.252 | Extended Support | |
Flash Player for Linux | 11.2.202.418 | Flash Player Download Center | |
Flash Player for Google Chrome | 15.0.0.223 |
Google Chrome Releases | |
Flash Player for Internet Explorer 10 and Internet Explorer 11 | 15.0.0.223 |
Microsoft Security Advisory | |
AIR Desktop Runtime | 15.0.0.356 | AIR Download Center | |
AIR SDK | 15.0.0.356 |
AIR SDK Download | |
AIR SDK and Compiler | 15.0.0.356 |
AIR SDK Download | |
AIR for Android | 15.0.0.356 |
Google Play |
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
- Ian Beer of Google Project Zero (CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0589, CVE-2014-0590)
- bilou working with the Chromium rewards program (CVE-2014-0574)
- bilou through Verisign’s iDefense Vulnerability Contributor Program (CVE-2014-0588, CVE-2014-8440)
- Behrang Fouladi Azarnaminy and Axel Souchet of Microsoft Vulnerability Research (CVE-2014-8442)
- Haifei Li of McAfee Labs IPS Team (CVE-2014-0583)
- Liu Jincheng and Wen Guanxing of Venustech ADLAB (CVE-2014-8438)
- Nicolas Joly (CVE-2014-0582)
- Lucas Leong of TrendMicro (CVE-2014-0581)
- Tavis Ormandy and Chris Evans of Google Project Zero (CVE-2014-0573, CVE-2014-0576)
- Natalie Silvanovich, working with Google Project Zero (CVE-2014-0577)
- SuperHei of KnownSec (CVE-2014-8441)
- Anonymously reported (CVE-2014-8437)