[arch-security] [ASA-201707-9] lib32-flashplugin: multiple issues

Remi Gacogne rgacogne at archlinux.org
Tue Jul 11 19:53:23 UTC 2017


Arch Linux Security Advisory ASA-201707-9
=========================================

Severity: Critical
Date    : 2017-07-11
CVE-ID  : CVE-2017-3080 CVE-2017-3099 CVE-2017-3100
Package : lib32-flashplugin
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-343

Summary
=======

The package lib32-flashplugin before version 26.0.0.137-1 is vulnerable
to multiple issues including arbitrary code execution and information
disclosure.

Resolution
==========

Upgrade to 26.0.0.137-1.

# pacman -Syu "lib32-flashplugin>=26.0.0.137-1"

The problems have been fixed upstream in version 26.0.0.137.

Workaround
==========

None.

Description
===========

- CVE-2017-3080 (information disclosure)

A security issue leading to information disclosure has been found in
Adobe Flash Player < 26.0.0.137.

- CVE-2017-3099 (arbitrary code execution)

A memory corruption vulnerability leading to remote code execution has
been found in Adobe Flash Player < 26.0.0.137.

- CVE-2017-3100 (information disclosure)

A memory corruption vulnerability leading to the disclosure of a memory
address has been found in Adobe Flash Player < 26.0.0.137. It could be
used to bypass some security protections like ASLR.

Impact
======

A remote attacker can execute arbitrary code on the affected host.

References
==========

https://helpx.adobe.com/security/products/flash-player/apsb17-21.html
https://security.archlinux.org/CVE-2017-3080
https://security.archlinux.org/CVE-2017-3099
https://security.archlinux.org/CVE-2017-3100

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170711/a9a4444c/attachment.asc>


More information about the arch-security mailing list