Bulletin ID
Security updates available for Flash Player | APSB17-33
Bulletin ID |
Date Published |
Priority |
---|---|---|
APSB17-33 |
November 14, 2017 |
2 |
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address critical vulnerabilities that could lead to code execution.
Product |
Version |
Platform |
---|---|---|
Adobe Flash Player Desktop Runtime |
27.0.0.183 and earlier versions |
Windows, Macintosh |
Adobe Flash Player for Google Chrome |
27.0.0.183 and earlier versions |
Windows, Macintosh, Linux and Chrome OS |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 |
27.0.0.183 and earlier versions |
Windows 10 and 8.1 |
Adobe Flash Player Desktop Runtime |
27.0.0.183 and earlier versions |
Linux |
To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right- click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product |
Version |
Platform |
Priority |
Availability |
---|---|---|---|---|
Adobe Flash Player Desktop Runtime |
27.0.0.187 |
Windows, Macintosh |
2 |
|
Adobe Flash Player for Google Chrome |
27.0.0.187 |
Windows, Macintosh, Linux and Chrome OS |
2 |
|
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 |
27.0.0.187 |
Windows 10 and 8.1 |
2 |
|
Adobe Flash Player Desktop Runtime |
27.0.0.187 |
Linux |
3 |
[1] Users who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.
Vulnerability Category |
Vulnerability Impact |
Severity |
CVE Number |
---|---|---|---|
Out-of-bounds Read |
Remote Code Execution |
Critical |
CVE-2017-3112 |
Out-of-bounds Read |
Remote Code Execution |
Critical |
CVE-2017-3114 |
Out-of-bounds Read |
Remote Code Execution |
Critical |
CVE-2017-11213 |
Use after free |
Remote Code Execution |
Critical |
CVE-2017-11215 |
Use after free |
Remote Code Execution |
Critical |
CVE-2017-11225 |
Adobe would like to thank the following individuals and organizations for reporting this issue and for working with Adobe to help protect our customers:
Увійдіть до облікового запису