Adobe Security Bulletin

Security updates available for Adobe Flash Player

Release date: March 10, 2016

Vulnerability identifier: APSB16-08

Priority: See table below

CVE number: CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0963, CVE-2016-0986, CVE-2016-0987, CVE-2016-0988, CVE-2016-0989, CVE-2016-0990, CVE-2016-0991, CVE-2016-0992, CVE-2016-0993, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, CVE-2016-1000, CVE-2016-1001, CVE-2016-1002, CVE-2016-1005, CVE-2016-1010

Platform: Windows, Macintosh and Linux

Summary

Adobe has released security updates for Adobe Flash Player.  These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.

Adobe is aware of a report that an exploit for CVE-2016-1010 is being used in limited, targeted attacks.

Affected Versions

Product Affected Versions Platform
Adobe Flash Player Desktop Runtime 20.0.0.306 and earlier
Windows and Macintosh
Adobe Flash Player Extended Support Release 18.0.0.329 and earlier Windows and Macintosh
Adobe Flash Player for Google Chrome 20.0.0.306 and earlier Windows, Macintosh, Linux and ChromeOS
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.306 and earlier Windows 10
Adobe Flash Player for Internet Explorer 11 20.0.0.306 and earlier Windows 8.1
Adobe Flash Player for Linux 11.2.202.569 and earlier Linux
AIR Desktop Runtime 20.0.0.260 and earlier Windows and Macintosh
AIR SDK 20.0.0.260 and earlier Windows, Macintosh, Android and iOS
AIR SDK & Compiler 20.0.0.260 and earlier Windows, Macintosh, Android and iOS
AIR for Android 20.0.0.233 and earlier Android
  • To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.  
  • To verify the version of Adobe AIR installed on your system, follow the instructions in the Adobe AIR TechNote.

Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:

Product Updated Versions Platform Priority rating Availability
Adobe Flash Player Desktop Runtime
21.0.0.182 Windows and Macintosh
1

Flash Player Download Center

Flash Player Distribution

Adobe Flash Player Extended Support Release 18.0.0.333 Windows and Macintosh
1 Extended Support
Adobe Flash Player for Google Chrome 21.0.0.182 Windows, Macintosh, Linux and ChromeOS    1 Google Chrome Releases
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 21.0.0.182 Windows 10 1 Microsoft Security Advisory
Adobe Flash Player for Internet Explorer 11 21.0.0.182 Windows 8.1
1 Microsoft Security Advisory
Adobe Flash Player for Linux 11.2.202.577 Linux 3 Flash Player Download Center
AIR Desktop Runtime 21.0.0.176 Windows and Macintosh 3 AIR Download Center
AIR SDK 21.0.0.176 Windows, Macintosh, Android and iOS 3 AIR SDK Download
AIR SDK & Compiler 21.0.0.176 Windows, Macintosh, Android and iOS 3 AIR SDK Download
AIR for Android 21.0.0.176 Android 3 Google Play Store
  • Adobe recommends users of the  Adobe Flash Player Desktop Runtime for Windows and Macintosh update to 21.0.0.182 via the update mechanism within the product when prompted [1], or by visiting the Adobe Flash Player Download Center.
  • Adobe recommends users of the Adobe Flash Player Extended Support Release should update to version 18.0.0.333 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html.
  • Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.577 by visiting the Adobe Flash Player Download Center.
  • Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 21.0.0.182 for Windows, Macintosh, Linux and Chrome OS.
  • Adobe Flash Player installed with Microsoft Edge and Internet Explorer for Windows 10 will be automatically updated to the latest version, which will include Adobe Flash Player 21.0.0.182. 
  • Adobe Flash Player installed with Internet Explorer for Windows 8.x will be automatically updated to the latest version, which will include Adobe Flash Player 21.0.0.182.
  • Adobe recommends users of the AIR desktop runtime, AIR SDK and AIR SDK & Compiler update to version 21.0.0.176 by visiting the AIR download center or the AIR developer center
  • Please visit the Flash Player Help page for assistance in installing Flash Player.
 
[1] Users of Flash Player 11.2.x or later for Windows, or Flash Player 11.3.x or later for Macintosh, who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.

Vulnerability Details

  • These updates resolve integer overflow vulnerabilities that could lead to code execution (CVE-2016-0963, CVE-2016-0993, CVE-2016-1010).
  • These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, CVE-2016-1000).
  • These updates resolve a heap overflow vulnerability that could lead to code execution (CVE-2016-1001).
  • These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, CVE-2016-1005).

Acknowledgments

  • Mateusz Jurczyk and Natalie Silvanovich of Google Project Zero (CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, CVE-2016-1000, CVE-2016-1001, CVE-2016-1002)
  • Wen Guanxing from Venustech ADLAB (CVE-2016-0990)
  • Natalie Silvanovich of Google Project Zero (CVE-2016-0987, CVE-2016-0988)
  • Fujibayashi Kyo working with HPE's Zero Day Initiative (CVE-2016-0996)
  • Kai Kang of Tencent's Xuanwu Lab (CVE-2016-0995)
  • instruder of the Alibaba Security Team (CVE-2016-0960, CVE-2016-0963)
  • Liu YongJun of NSFOCUS Security Team (CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989)
  • Nicolas Joly of Microsoft Vulnerability Research (MSVR) (CVE-2016-0991, CVE-2016-0993)
  • Ichinose Kotomi working with HPE's Zero Day Initiative (CVE-2016-0994)
  • AbdulAziz Hariri of HPE's Zero Day Initiative (CVE-2016-1005)
  • Anton Ivanov of Kaspersky Lab (CVE-2016-1010)
  • riusksk of Tencent Security Platform Department (CVE-2016-0992)