[arch-security] [ASA-201605-16] flashplugin: arbitrary code execution

Remi Gacogne rgacogne at archlinux.org
Thu May 12 22:18:28 UTC 2016


Arch Linux Security Advisory ASA-201605-16
==========================================

Severity: Critical
Date    : 2016-05-12
CVE-ID  : CVE-2016-1096 CVE-2016-1097 CVE-2016-1098 CVE-2016-1099
          CVE-2016-1100 CVE-2016-1101 CVE-2016-1102 CVE-2016-1103
          CVE-2016-1104 CVE-2016-1105 CVE-2016-1106 CVE-2016-1107
          CVE-2016-1108 CVE-2016-1109 CVE-2016-1110 CVE-2016-4108
          CVE-2016-4109 CVE-2016-4110 CVE-2016-4111 CVE-2016-4112
          CVE-2016-4113 CVE-2016-4114 CVE-2016-4115 CVE-2016-4116
          CVE-2016-4117
Package : flashplugin
Type    : arbitrary code execution
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package flashplugin before version 11.2.202.621-1 is vulnerable to
arbitrary code execution.

Resolution
==========

Upgrade to 11.2.202.621-1.

# pacman -Syu "flashplugin>=11.2.202.621-1"

The problem has been fixed upstream in version 11.2.202.621.

Workaround
==========

None.

Description
===========

- CVE-2016-1096:

Memory corruption. Mateusz Jurczyk and Natalie Silvanovich of Google
Project Zero.

- CVE-2016-1097:

Use-after-free. Wen Guanxing from Pangu LAB, working with the Chromium
Vulnerability Rewards Program .

- CVE-2016-1098:

Memory corruption. Wen Guanxing from Pangu LAB.

- CVE-2016-1099:

Memory corruption. Wen Guanxing from Pangu LAB.

- CVE-2016-1100:

Memory corruption. Wen Guanxing from Pangu LAB.

- CVE-2016-1101:

Heap buffer overflow. Mateusz Jurczyk and Natalie Silvanovich of Google
Project Zero.

- CVE-2016-1102:

Memory corruption. Mateusz Jurczyk and Natalie Silvanovich of Google
Project Zero.

- CVE-2016-1103:

Buffer overflow. Mateusz Jurczyk and Natalie Silvanovich of Google
Project Zero.

- CVE-2016-1104:

Memory corruption. Mateusz Jurczyk and Natalie Silvanovich of Google
Project Zero.

- CVE-2016-1105:

Type confusion. Natalie Silvanovich of Google Project Zero.

- CVE-2016-1106:

Use-after-free. Natalie Silvanovich of Google Project Zero.

- CVE-2016-1107:

Use-after-free. NSFOCUS Security Team.

- CVE-2016-1108:

Use-after-free. Nicolas Joly of Microsoft Vulnerability Research.

- CVE-2016-1109:

Use-after-free. Nicolas Joly of Microsoft Vulnerability Research.

- CVE-2016-1110:

Use-after-free. Nicolas Joly of Microsoft Vulnerability Research.

- CVE-2016-4108:

Use-after-free. Natalie Silvanovich of Google Project Zero.

- CVE-2016-4109:

Memory corruption. willJ of Tencent PC Manager.

- CVE-2016-4110:

Use-after-free. willJ of Tencent PC Manager.

- CVE-2016-4111:

Memory corruption. willJ of Tencent PC Manager.

- CVE-2016-4112:

Memory corruption. willJ of Tencent PC Manager.

- CVE-2016-4113:

Memory corruption. willJ of Tencent PC Manager.

- CVE-2016-4114:

Memory corruption. willJ of Tencent PC Manager.

- CVE-2016-4115:

Memory corruption. willJ of Tencent PC Manager.

- CVE-2016-4116:

Vulnerability in the directory search path used to find resources.
Ladislav Baco of CSIRT.SK.

- CVE-2016-4117:

Type confusion vulnerability that could lead to code execution. Genwei
Jiang of FireEye, Inc.

Impact
======

A remote attacker can execute arbitrary code on the affected host.

References
==========

https://helpx.adobe.com/security/products/flash-player/apsa16-02.html
https://access.redhat.com/security/cve/CVE-2016-1096
https://access.redhat.com/security/cve/CVE-2016-1097
https://access.redhat.com/security/cve/CVE-2016-1098
https://access.redhat.com/security/cve/CVE-2016-1099
https://access.redhat.com/security/cve/CVE-2016-1100
https://access.redhat.com/security/cve/CVE-2016-1101
https://access.redhat.com/security/cve/CVE-2016-1102
https://access.redhat.com/security/cve/CVE-2016-1103
https://access.redhat.com/security/cve/CVE-2016-1104
https://access.redhat.com/security/cve/CVE-2016-1105
https://access.redhat.com/security/cve/CVE-2016-1106
https://access.redhat.com/security/cve/CVE-2016-1107
https://access.redhat.com/security/cve/CVE-2016-1108
https://access.redhat.com/security/cve/CVE-2016-1109
https://access.redhat.com/security/cve/CVE-2016-1110
https://access.redhat.com/security/cve/CVE-2016-4108
https://access.redhat.com/security/cve/CVE-2016-4109
https://access.redhat.com/security/cve/CVE-2016-4110
https://access.redhat.com/security/cve/CVE-2016-4111
https://access.redhat.com/security/cve/CVE-2016-4112
https://access.redhat.com/security/cve/CVE-2016-4113
https://access.redhat.com/security/cve/CVE-2016-4114
https://access.redhat.com/security/cve/CVE-2016-4115
https://access.redhat.com/security/cve/CVE-2016-4116
https://access.redhat.com/security/cve/CVE-2016-4117

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160513/d2888e9b/attachment.asc>


More information about the arch-security mailing list