Release date: December 8, 2015
Last updated: June 3, 2016
Vulnerability identifier: APSB15-32
Priority: See table below
CVE number: CVE-2015-8045, CVE-2015-8047, CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8418, CVE-2015-8454, CVE-2015-8455, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8060, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8407, CVE-2015-8408, CVE-2015-8409, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8415, CVE-2015-8416, CVE-2015-8417, CVE-2015-8419, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8438, CVE-2015-8439, CVE-2015-8440, CVE-2015-8441, CVE-2015-8442, CVE-2015-8443, CVE-2015-8444, CVE-2015-8445, CVE-2015-8446, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8451, CVE-2015-8452, CVE-2015-8453, CVE-2015-8456, CVE-2015-8457, CVE-2015-8652, CVE-2015-8653, CVE-2015-8654, CVE-2015-8655, CVE-2015-8656, CVE-2015-8657, CVE-2015-8658, CVE-2015-8820, CVE-2015-8821, CVE-2015-8822, CVE-2015-8823
Platform: All Platforms
Adobe has released security updates for Adobe Flash Player. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
Product | Affected Versions | Platform |
---|---|---|
Adobe Flash Player Desktop Runtime | 19.0.0.245 and earlier |
Windows and Macintosh |
Adobe Flash Player Extended Support Release | 18.0.0.261 and earlier | Windows and Macintosh |
Adobe Flash Player for Google Chrome | 19.0.0.245 and earlier | Windows, Macintosh, Linux and ChromeOS |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 | 19.0.0.245 and earlier | Windows 10 |
Adobe Flash Player for Internet Explorer 10 and 11 | 19.0.0.245 and earlier | Windows 8.0 and 8.1 |
Adobe Flash Player for Linux | 11.2.202.548 and earlier | Linux |
AIR Desktop Runtime | 19.0.0.241 and earlier | Windows and Macintosh |
AIR SDK | 19.0.0.241 and earlier | Windows, Macintosh, Android and iOS |
AIR SDK & Compiler | 19.0.0.241 and earlier | Windows, Macintosh, Android and iOS |
AIR for Android | 19.0.0.241 and earlier | Android |
- To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
- To verify the version of Adobe AIR installed on your system, follow the instructions in the Adobe AIR TechNote.
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product | Updated Versions | Platform | Availability | |
---|---|---|---|---|
Adobe Flash Player Desktop Runtime (support for Internet Explorer) |
20.0.0.228 | Windows and Macintosh |
1 | |
Adobe Flash Player Desktop Runtime (support for Firefox and Safari) | 20.0.0.235 | Windows and Macintosh | 1 | |
Adobe Flash Player Extended Support Release | 18.0.0.268 | Windows and Macintosh |
1 | Extended Support |
Adobe Flash Player for Google Chrome | 20.0.0.228 | Windows, Macintosh, Linux and ChromeOS | 1 | Google Chrome Releases |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 | 20.0.0.228 | Windows 10 | 1 | Microsoft Security Advisory |
Adobe Flash Player for Internet Explorer 10 and 11 | 20.0.0.228 | Windows 8.0 and 8.1 |
1 | Microsoft Security Advisory |
Adobe Flash Player for Linux | 11.2.202.554 | Linux | 3 | Flash Player Download Center |
AIR Desktop Runtime | 20.0.0.204 | Windows and Macintosh | 3 | AIR Download Center |
AIR SDK | 20.0.0.204 | Windows, Macintosh, Android and iOS | 3 | AIR SDK Download |
AIR SDK & Compiler | 20.0.0.204 | Windows, Macintosh, Android and iOS | 3 | AIR SDK Download |
AIR for Android | 20.0.0.204 | Android | 3 | Google Play |
- Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows and Macintosh update to 20.0.0.228 (support for Internet Explorer) and 20.0.0.235 (support for Firefox and Safari) by visiting the Adobe Flash Player Download Center, or via the update mechanism within the product when prompted [1].
- Adobe recommends users of the Adobe Flash Player Extended Support Release should update to version 18.0.0.268 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html.
- Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.554 by visiting the Adobe Flash Player Download Center.
- Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 20.0.0.228 for Windows, Macintosh, Linux and Chrome OS.
- Adobe Flash Player installed with Microsoft Edge and Internet Explorer for Windows 10 will be automatically updated to the latest version, which will include Adobe Flash Player 20.0.0.228.
- Adobe Flash Player installed with Internet Explorer for Windows 8.x will be automatically updated to the latest version, which will include Adobe Flash Player 20.0.0.228.
- Adobe recommends users of the AIR desktop runtime, AIR SDK and AIR SDK & Compiler update to version 20.0.0.204 by visiting the AIR download center or the AIR developer center.
- Please visit the Flash Player Help page for assistance in installing Flash Player.
- These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-8438, CVE-2015-8446).
- These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417, CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045, CVE-2015-8418, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408, CVE-2015-8652, CVE-2015-8654, CVE-2015-8656, CVE-2015-8657, CVE-2015-8658, CVE-2015-8820).
- These updates resolve security bypass vulnerabilities (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409).
- These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2015-8407, CVE-2015-8457).
- These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-8439, CVE-2015-8456).
- These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-8445).
- These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-8415)
- These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437, CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452, CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411, CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426, CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434, CVE-2015-8435, CVE-2015-8414, CVE-2015-8454, CVE-2015-8059, CVE-2015-8058, CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067, CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065, CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403, CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8653, CVE-2015-8655, CVE-2015-8822, CVE-2015-8821, CVE-2015-8823).
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
- AbdulAziz Hariri of HPE's Zero Day Initiative (CVE-2015-8652, CVE-2015-8653, CVE-2015-8654, CVE-2015-8656, CVE-2015-8657, CVE-2015-8822, CVE-2015-8658, CVE-2015-8820, CVE-2015-8821)
- Anonymous working with HPE's Zero Day Initiative (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437, CVE-2015-8438, CVE-2015-8446, CVE-2015-8655, CVE-2015-8823)
- bee13oy, working with the Chromium Vulnerability Rewards Program (CVE-2015-8418)
- bilou working with HPE's Zero Day Initiative (CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8442, CVE-2015-8447, CVE-2015-8445, CVE-2015-8439)
- Furugawa Nagisa working with HPE's Zero Day Initiative (CVE-2015-8436)
- Hui Gao of Palo Alto Networks (CVE-2015-8443, CVE-2015-8444)
- instruder of Alibaba Security Threat Information Center (CVE-2015-8060, CVE-2015-8408, CVE-2015-8419)
- Jie Zeng of Qihoo 360 (CVE-2015-8415, CVE-2015-8417)
- Jie Zeng of Qihoo 360 and Anonymous working with HPE's Zero Day Initiative (CVE-2015-8416)
- LMX of Qihoo 360 (CVE-2015-8451, CVE-2015-8452)
- Natalie Silvanovich of Google Project Zero (CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411, CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426, CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434, CVE-2015-8456)
- Nicolas Joly of Microsoft Security (CVE-2015-8414, CVE-2015-8435)
- s3tm3m working with HP's Zero Day Initiative (CVE-2015-8457)
- VUPEN working with HPE's Zero Day Initiative (CVE-2015-8453)
- willJ of Tencent PC Manager (CVE-2015-8407)
- Yuki Chen of Qihoo 360 Vulcan Team (CVE-2015-8454, CVE-2015-8059, CVE-2015-8058, CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067, CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065, CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403, CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070, CVE-2015-8440, CVE-2015-8409, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045, CVE-2015-8441)
December 8, 2015: Removed CVE-2015-8051, CVE-2015-8052 and CVE-2015-8053 (all were previously assigned). Added CVE-2015-8418 (replacement for CVE-2015-8051), CVE-2015-8454 (replacement for CVE-2015-8052) and CVE-2015-8455 (replacement for CVE-2015-8053). Also removed CVE-2015-8054, which was mistakenly included in the original bulletin.
December 9, 2015: Added CVE-2015-8456 and CVE-2015-8457, which were inadvertently omitted from the original bulletin.
March 2, 2016: Added the following CVEs, which were inadvertently omitted from the original version: CVE-2015-8652, CVE-2015-8653, CVE-2015-8654, CVE-2015-8655, CVE-2015-8656, CVE-2015-8657, CVE-2015-8822, CVE-2015-8658, CVE-2015-8820, CVE-2015-8821.
April 15, 2016: Added CVE-2015-8823, which was inadvertently omitted from the original version.
June 3, 2016: Added credit to Anonymous working with HPE's Zero Day Initiative for CVE-2015-8416. This CVE was also independently reported by Jie Zeng of Qihoo 360.