20170615

Security updates available for Flash Player | APSB17-17

Security updates available for Flash Player | APSB17-17
Bulletin ID Date Published Priority
APSB17-17 June 13, 2017 1

【外部リンク】
https://helpx.adobe.com/security/products/flash-player/apsb17-17.html
Affected product versions

Product Version Platform
Adobe Flash Player Desktop Runtime 25.0.0.171 and earlier Windows, Macintosh and Linux
Adobe Flash Player for Google Chrome 25.0.0.171 and earlier Windows, Macintosh, Linux and Chrome OS
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 25.0.0.171 and earlier Windows 10 and 8.1
Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:

Product Version Platform Priority Availability
Adobe Flash Player Desktop Runtime 26.0.0.126 Windows, Macintosh 1
Flash Player Download Center

Flash Player Distribution

Adobe Flash Player for Google Chrome 26.0.0.126 Windows, Macintosh, Linux and Chrome OS 1 Google Chrome Releases
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 26.0.0.120 Windows 10 and 8.1 1 Microsoft Security Advisory
Adobe Flash Player Desktop Runtime 26.0.0.126 Linux 3 Flash Player Download Center
Note:

Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows, Macintosh and Linux update to Adobe Flash Player 26.0.0.126 via the update mechanism within the product [1] or by visiting the Adobe Flash Player Download Center.
Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 26.0.0.126 for Windows, Macintosh, Linux and Chrome OS.
Adobe Flash Player installed with Microsoft Edge and Internet Explorer 11 for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 26.0.0.120.
Please visit the Flash Player Help page for assistance in installing Flash Player.
[1] Users who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.

Vulnerability details

Vulnerability Category Vulnerability Impact Severity CVE Numbers
Use After Free
Remote Code Execution Critical CVE-2017-3075, CVE-2017-3081, CVE-2017-3083, CVE-2017-3084
Memory Corruption Remote Code Execution Critical CVE-2017-3076, CVE-2017-3077, CVE-2017-3078, CVE-2017-3079, CVE-2017-3082
--

注目の投稿

Shadowserver Foundation http://65.49.1.117/

Shadowserver Foundation port 14491 discarded for LINK-FRMWRK: NO ENTRY IN LOOKUP TABLE TO COMPLETE OPERATION, GigaEthernet2.0 Wistron Neweb ...

人気の投稿