Bulletin ID
Security updates available for Flash Player | APSB18-19
|
Date Published |
Priority |
---|---|---|
APSB18-19 |
June 7, 2018 |
1 |
Summary
Adobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS. These updates address critical vulnerabilities in Adobe Flash Player 29.0.0.171 and earlier versions. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Adobe is aware of a report that an exploit for CVE-2018-5002 exists in the wild, and is being used in limited, targeted attacks against Windows users. These attacks leverage Office documents with embedded malicious Flash Player content distributed via email.
Affected Product Versions
Product |
Version |
Platform |
---|---|---|
Adobe Flash Player Desktop Runtime |
29.0.0.171 and earlier versions |
Windows, macOS and Linux |
Adobe Flash Player for Google Chrome |
29.0.0.171 and earlier versions |
Windows, macOS, Linux and Chrome OS |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 |
29.0.0.171 and earlier versions |
Windows 10 and 8.1 |
To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right- click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the latest version:
Product |
Version |
Platform |
Priority |
Availability |
---|---|---|---|---|
Adobe Flash Player Desktop Runtime |
30.0.0.113 |
Windows, macOS |
1 |
|
Adobe Flash Player for Google Chrome |
30.0.0.113 |
Windows, macOS, Linux, and Chrome OS |
1 |
|
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 |
30.0.0.113 |
Windows 10 and 8.1 |
1 |
|
Adobe Flash Player Desktop Runtime |
30.0.0.113 |
Linux |
3 |
- Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows, macOS and Linux update to Adobe Flash Player 30.0.0.113 via the update mechanism within the product [1] or by visiting the Adobe Flash Player Download Center.
- Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 30.0.0.113 for Windows, macOS, Linux and Chrome OS.
- Adobe Flash Player installed with Microsoft Edge and Internet Explorer 11 for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 30.0.0.113.
- Please visit the Flash Player Help page for assistance in installing Flash Player.
[1] Users who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.
Vulnerability details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVE Number |
---|---|---|---|
Type Confusion |
Arbitrary Code Execution |
Critical |
CVE-2018-4945 |
Integer Overflow |
Information Disclosure |
Important |
CVE-2018-5000 |
Out-of-bounds read |
Information Disclosure |
Important |
CVE-2018-5001 |
Stack-based buffer overflow |
Arbitrary Code Execution |
Critical |
CVE-2018-5002 |
Acknowledgments
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
Jihui Lu of Tencent KeenLab and willJ of Tencent PC Manager working with Trend Micro's Zero Day Initiative (CVE-2018-4945)
Anonymously reported through Trend Micro's Zero Day Initiative (CVE-2018-5000, CVE-2018-5001)
CVE-2018-5002 was independently identified and reported by the following organizations and individuals: Chenming Xu and Jason Jones of ICEBRG , Bai Haowen, Zeng Haitao and Huang Chaowen of 360 Threat Intelligence Center of 360 Enterprise Security Group, and Yang Kang, Hu Jiang, Zhang Qing, and Jin Quan of Qihoo 360 Core Security (@360CoreSec), Tencent PC Manager (http://guanjia.qq.com/)
Sign in to your account