Security updates available for Adobe Flash Player

Release date: October 13, 2015

Last updated: January 7, 2016

Vulnerability identifier: APSB15-25

Priority: See table below

CVE number: CVE-2015-5569, CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630, CVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7638, CVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7642, CVE-2015-7643, CVE-2015-7644

Platform: All Platforms

Summary

Adobe has released security updates for Adobe Flash Player.  These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.

Affected Versions

Product Affected Versions Platform
Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier
Windows and Macintosh
Adobe Flash Player Extended Support Release 18.0.0.241 and earlier Windows and Macintosh
Adobe Flash Player for Google Chrome 19.0.0.185 and earlier Windows, Macintosh, Linux and ChromeOS
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier Windows 10
Adobe Flash Player for Internet Explorer 10 and 11 19.0.0.185 and earlier Windows 8.0 and 8.1
Adobe Flash Player for Linux 11.2.202.521 and earlier Linux
AIR Desktop Runtime 19.0.0.190 and earlier Windows and Macintosh
AIR SDK 19.0.0.190 and earlier Windows, Macintosh, Android and iOS
AIR SDK & Compiler 19.0.0.190 and earlier Windows, Macintosh, Android and iOS
  • To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.  
  • To verify the version of Adobe AIR installed on your system, follow the instructions in the Adobe AIR TechNote

Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:

Product Updated Versions Platform Availability
Adobe Flash Player Desktop Runtime
19.0.0.207 Windows and Macintosh
1 Flash Player Download Center  Flash Player Distribution
Adobe Flash Player Extended Support Release 18.0.0.252 Windows and Macintosh
1 Extended Support
Adobe Flash Player for Google Chrome 19.0.0.207 Windows, Macintosh, Linux and ChromeOS    1 Google Chrome Releases
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.207 Windows 10 1 Microsoft Security Advisory
Adobe Flash Player for Internet Explorer 10 and 11 19.0.0.207 Windows 8.0 and 8.1
1 Microsoft Security Advisory
Adobe Flash Player for Linux 11.2.202.535 Linux 3 Flash Player Download Center
AIR Desktop Runtime 19.0.0.213 Windows and Macintosh 3 AIR Download Center
AIR SDK 19.0.0.213 Windows, Macintosh, Android and iOS 3 AIR SDK Download
AIR SDK & Compiler 19.0.0.213 Windows, Macintosh, Android and iOS 3 AIR SDK Download
  • Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows and Macintosh update to Adobe Flash Player 19.0.0.207 by visiting the Adobe Flash Player Download Center or via the update mechanism within the product when prompted [1].
  • Adobe recommends users of the Adobe Flash Player Extended Support Release update to version 18.0.0.252 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html.
  • Adobe recommends users of the Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.535 by visiting the Adobe Flash Player Download Center
  • Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 19.0.0.207 on Windows, Macintosh, Linux and Chrome OS.
  • Adobe Flash Player installed with Microsoft Edge for Windows 10 will be automatically updated to the latest version, which will include Adobe Flash Player 19.0.0.207.
  • Adobe Flash Player installed with Internet Explorer 10 and 11 for Windows 8.0 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 19.0.0.207.
  • Adobe recommends users of the AIR desktop runtime, AIR SDK and AIR SDK & Compiler update to version 19.0.0.213 by visiting the AIR download center or the AIR developer center
  • Please visit the Flash Player Help page for assistance in installing Flash Player.
 
[1] Users of Flash Player 11.2.x or later for Windows, or Flash Player 11.3.x or later for Macintosh, who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.

Vulnerability Details

  • These updates resolve a vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-7628).
  • These updates include a defense-in-depth feature in the Flash broker API (CVE-2015-5569).
  • These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-7629, CVE-2015-7631, CVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7638, CVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7642, CVE-2015-7643, CVE-2015-7644).
  • These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-7632).
  • These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633).

Acknowledgments

Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers: 

  • Dave "dwizzzle" Weston (CVE-2015-5569)
  • bee13oy, working with the Chromium Vulnerability Rewards Program (CVE-2015-7633)
  • instruder of the Alibaba Security Threat Information Center working with HP's Zero Day Initiative (CVE-2015-7629)
  • Anonymous working with HP's Zero Day Initiative (CVE-2015-7632)
  • Nicolas Joly, and Natalie Silvanovich from Google Project Zero (CVE-2015-7644)
  • bilou working with HP's Zero Day Initiative (CVE-2015-7631)
  • bilou working with HP's Zero Day Initiative and Yuki Chen of Qihoo 360 Vulcan Team (CVE-2015-7643)
  • instruder of the Alibaba Security Threat Information Center (CVE-2015-7630)
  • Jincheng Liu and Lijun Cheng of the Alibaba Security Research Team (CVE-2015-7625, CVE-2015-7626)
  • Kai Kang of Tencent's Xuanwu LAB (CVE-2015-7627)
  • Yuki Chen of Qihoo 360 Vulcan Team (CVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7638, CVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7642, CVE-2015-7643)
  • Mr. Tokuji Akamine (CVE-2015-7628)

Revisions

October 14, 2015: Added CVEs credited to Yuki Chen of Qihoo 360 Vulcan Team

November 5, 2015: Removed CVE-2015-7634 from the bulletin.  This CVE was originally classified as a memory corruption issue, but has since been reclassified as a non-exploitable null pointer dereference bug.

January 7, 2016: Added credit to Mr. Tokuji Akamine for disclosing CVE-2015-7628