[arch-security] [ASA-201701-17] lib32-flashplugin: multiple issues

Remi Gacogne rgacogne at archlinux.org
Fri Jan 13 08:38:50 UTC 2017


Arch Linux Security Advisory ASA-201701-17
==========================================

Severity: Critical
Date    : 2017-01-12
CVE-ID  : CVE-2017-2925 CVE-2017-2926 CVE-2017-2927 CVE-2017-2928
          CVE-2017-2930 CVE-2017-2931 CVE-2017-2932 CVE-2017-2933
          CVE-2017-2934 CVE-2017-2935 CVE-2017-2936 CVE-2017-2937
          CVE-2017-2938
Package : lib32-flashplugin
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-136

Summary
=======

The package lib32-flashplugin before version 24.0.0.194-1 is vulnerable
to multiple issues including arbitrary code execution and information
disclosure.

Resolution
==========

Upgrade to 24.0.0.194-1.

# pacman -Syu "lib32-flashplugin>=24.0.0.194-1"

The problems have been fixed upstream in version 24.0.0.194.

Workaround
==========

None.

Description
===========

- CVE-2017-2925 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
memory corruption vulnerability in the JPEG XR codec.

- CVE-2017-2926 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
memory corruption vulnerability related to processing of atoms in MP4
files.

- CVE-2017-2927 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
heap overflow vulnerability when processing Adobe Texture Format files.

- CVE-2017-2928 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
memory corruption vulnerability related to setting visual mode effects.

- CVE-2017-2930 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
memory corruption vulnerability due to a concurrency error when
manipulating a display list. Successful exploitation could lead to
arbitrary code execution.

- CVE-2017-2931 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
memory corruption vulnerability related to the parsing of SWF metadata.

- CVE-2017-2932 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
use after free vulnerability in the ActionScript MovieClip class.

- CVE-2017-2933 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
heap overflow vulnerability related to texture compression.

- CVE-2017-2934 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
heap overflow vulnerability when parsing Adobe Texture Format files.

- CVE-2017-2935 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
heap overflow vulnerability when processing the Flash Video container
file format.

- CVE-2017-2936 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
use after free vulnerability in the ActionScript FileReference class.

- CVE-2017-2937 (arbitrary code execution)

Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable
use after free vulnerability in the ActionScript FileReference class,
when using class inheritance.

- CVE-2017-2938 (information disclosure)

Adobe Flash Player versions 24.0.0.186 and earlier have a security
bypass vulnerability related to handling TCP connections.

Impact
======

A remote attacker can access sensitive information or execute arbitrary
code on the affected host.

References
==========

https://helpx.adobe.com/security/products/flash-player/apsb17-02.html
https://security.archlinux.org/CVE-2017-2925
https://security.archlinux.org/CVE-2017-2926
https://security.archlinux.org/CVE-2017-2927
https://security.archlinux.org/CVE-2017-2928
https://security.archlinux.org/CVE-2017-2930
https://security.archlinux.org/CVE-2017-2931
https://security.archlinux.org/CVE-2017-2932
https://security.archlinux.org/CVE-2017-2933
https://security.archlinux.org/CVE-2017-2934
https://security.archlinux.org/CVE-2017-2935
https://security.archlinux.org/CVE-2017-2936
https://security.archlinux.org/CVE-2017-2937
https://security.archlinux.org/CVE-2017-2938

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170113/0e12e340/attachment.asc>


More information about the arch-security mailing list