Release date: February 5, 2015
Last updated: February 19, 2015
Vulnerability identifier: APSB15-04
Priority: See table below
CVE number: CVE-2015-0313, CVE-2015-0314, CVE-2015-0315, CVE-2015-0316, CVE-2015-0317, CVE-2015-0318, CVE-2015-0319, CVE-2015-0320, CVE-2015-0321, CVE-2015-0322, CVE-2015-0323, CVE-2015-0324, CVE-2015-0325, CVE-2015-0326, CVE-2015-0327, CVE-2015-0328, CVE-2015-0329, CVE-2015-0330, CVE-2015-0331
Platform: All Platforms
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system.
Adobe is aware of reports that CVE-2015-0313 is actively being exploited in the wild via drive-by-download attacks against systems running Internet Explorer and Firefox on Windows 8.1 and below. Adobe recommends users update their product installations to the latest versions:
Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 16.0.0.305.
Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.269.
Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.442.
Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 16.0.0.305.
Adobe Flash Player 16.0.0.296 and earlier versions
Adobe Flash Player 13.0.0.264 and earlier 13.x versions
Adobe Flash Player 11.2.202.440 and earlier 11.x versions
To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Adobe recommends users update their software installations by following the instructions below:
Adobe recommends users of the Adobe Flash Player desktop runtime for Windows and Macintosh update to Adobe Flash Player 16.0.0.305 by visiting the Adobe Flash Player Download Center, or via the update mechanism within the product when prompted.
Adobe recommends users of the Adobe Flash Player Extended Support Release should update to version 13.0.0.269 by visiting http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html.
Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.442 by visiting the Adobe Flash Player Download Center.
Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 16.0.0.305.
Adobe Flash Player installed with Internet Explorer for Windows 8.x will be automatically updated to the latest version, which will include Adobe Flash Player 16.0.0.305.
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product | Affected versions | Platform | Priority rating |
---|---|---|---|
Adobe Flash Player Desktop Runtime | 16.0.0.296 and earlier |
Windows and Macintosh |
1 |
Adobe Flash Player Extended Support Release | 13.0.0.264 and earlier | Windows and Macintosh |
1 |
Adobe Flash Player for Google Chrome | 16.0.0.296 and earlier | Windows, Macintosh and Linux |
1 |
Adobe Flash Player for Internet Explorer 10 and Internet Explorer 11 | 16.0.0.296 and earlier | Windows 8.0 and 8.1 | 1 |
Adobe Flash Player | 11.2.202.440 and earlier | Linux | 3 |
These updates address critical vulnerabilities in the software.
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system.
Adobe is aware of reports that CVE-2015-0313 is actively being exploited in the wild via drive-by-download attacks against systems running Internet Explorer and Firefox on Windows 8.1 and below. Adobe recommends users update their product installations to the latest versions:
Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 16.0.0.305.
Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.269.
Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.442.
Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 16.0.0.305.
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-0313, CVE-2015-0315, CVE-2015-0320, CVE-2015-0322, CVE-2015-0331).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, CVE-2015-0329, CVE-2015-0330).
These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2015-0317, CVE-2015-0319).
These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-0323, CVE-2015-0327).
These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-0324).
These updates resolve null pointer dereference issues (CVE-2015-0325, CVE-2015-0326, CVE-2015-0328).
Affected Software | Recommended Player Update | Availability | |
---|---|---|---|
Flash Player Desktop Runtime |
16.0.0.305 | ||
Flash Player Extended Support Release | 13.0.0.269 | Extended Support | |
Flash Player for Linux | 11.2.202.442 | Flash Player Download Center | |
Flash Player for Google Chrome | 16.0.0.305 | Google Chrome Releases | |
Flash Player for Internet Explorer 10 and Internet Explorer 11 | 16.0.0.305 |
Microsoft Security Advisory |
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
Elia Florio and Dave Weston of Microsoft, and Peter Pi of Trend Micro (CVE-2015-0313)
bilou working with HP's Zero Day Initiative (CVE-2015-0314, CVE-2015-0331)
bilou working with the Chromium Vulnerability Rewards Program (CVE-2015-0315, CVE-2015-0320)
Robert Święcki of Google (CVE-2015-0316)
Mark Brand of Google Project Zero and Natalie Silvanovich, working with Google Project Zero (CVE-2015-0317, CVE-2015-0318)
Mark Brand of Google Project Zero (CVE-2015-0323, CVE-2015-0329)
Natalie Silvanovich, working with Google Project Zero (CVE-2015-0319)
Anonymous, working with the Chromium Vulnerability Rewards Program (CVE-2015-0321)
Jihui Lu of KeenTeam (@K33nTeam), working with the Chromium Vulnerability Rewards Program (CVE-2015-0322)
Ian Beer of Google Project Zero (CVE-2015-0324, CVE-2015-0327)
Wen Guanxing from Venustech ADLAB (CVE-2015-0330)