Adobe Security Bulletin

Security updates available for Adobe Flash Player

Release date: March 14, 2017

Last updated: April 13, 2017

Vulnerability identifier: APSB17-07

Priority: See table below

CVE number: CVE-2017-2994, CVE-2017-2997, CVE-2017-2998, CVE-2017-2999, CVE-2017-3000, CVE-2017-3001, CVE-2017-3002, CVE-2017-3003

Platform: Windows, Macintosh, Linux and Chrome OS

Summary

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.  

Affected  versions

Product Affected Versions Platform
Adobe Flash Player Desktop Runtime 24.0.0.221 and earlier Windows, Macintosh and Linux
Adobe Flash Player for Google Chrome 24.0.0.221 and earlier Windows, Macintosh, Linux and Chrome OS
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 24.0.0.221 and earlier Windows 10 and 8.1
  • To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.  

Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:

Product Updated Versions Platform Priority rating Availability
Adobe Flash Player Desktop Runtime 25.0.0.127 Windows and Macintosh 1 Flash Player Download Center
Flash Player Distribution
Adobe Flash Player for Google Chrome 25.0.0.127  Windows, Macintosh, Linux and Chrome OS 1 Google Chrome Releases
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 25.0.0.127 Windows 10 and 8.1 1 Microsoft Security Advisory
Adobe Flash Player Desktop Runtime 25.0.0.127 Linux 3 Flash Player Download Center
  • Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows, Macintosh and Linux update to Adobe Flash Player 25.0.0.127 via the update mechanism within the product [1] or by visiting the Adobe Flash Player Download Center.
  • Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 25.0.0.127 for Windows, Macintosh, Linux and Chrome OS.
  • Adobe Flash Player installed with Microsoft Edge and Internet Explorer 11 for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 25.0.0.127.
  • Please visit the Flash Player Help page for assistance in installing Flash Player.

[1] Users who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.

Vulnerability Details

  • These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2017-2997).
  • These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2017-2998, CVE-2017-2999).
  • These updates resolve a random number generator vulnerability used for constant blinding that could lead to information disclosure (CVE-2017-3000).
  • These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2017-2994, CVE-2017-3001, CVE-2017-3002, CVE-2017-3003).

Acknowledgments

Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:

  • Tao Yan (@Ga1ois) of Palo Alto Networks (CVE-2017-2997, CVE-2017-2998, CVE-2017-2999)
  • Wang Chenyu and Wu Hongjun of Nanyang Technological University (CVE-2017-3000)
  • Yuki Chen of Qihoo 360 Vulcan Team working with Chromium Vulnerability Rewards Program and Anonymous working with Trend Micro's Zero Day Initiative (CVE-2017-3001)
  • Yuki Chen of Qihoo 360 Vulcan Team working with Chromium Vulnerability Rewards Program (CVE-2017-3002, CVE-2017-3003)
  • bo13oy of CloverSec Labs working with Trend Micro's Zero Day Initiative (CVE-2017-2994).

Revisions

April 13, 2017: Added reference to CVE-2017-2994 which was incorrectly omitted to the bulletin.