[arch-security] [ASA-201707-9] lib32-flashplugin: multiple issues
Remi Gacogne
rgacogne at archlinux.org
Tue Jul 11 19:53:23 UTC 2017
Arch Linux Security Advisory ASA-201707-9
=========================================
Severity: Critical
Date : 2017-07-11
CVE-ID : CVE-2017-3080 CVE-2017-3099 CVE-2017-3100
Package : lib32-flashplugin
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-343
Summary
=======
The package lib32-flashplugin before version 26.0.0.137-1 is vulnerable
to multiple issues including arbitrary code execution and information
disclosure.
Resolution
==========
Upgrade to 26.0.0.137-1.
# pacman -Syu "lib32-flashplugin>=26.0.0.137-1"
The problems have been fixed upstream in version 26.0.0.137.
Workaround
==========
None.
Description
===========
- CVE-2017-3080 (information disclosure)
A security issue leading to information disclosure has been found in
Adobe Flash Player < 26.0.0.137.
- CVE-2017-3099 (arbitrary code execution)
A memory corruption vulnerability leading to remote code execution has
been found in Adobe Flash Player < 26.0.0.137.
- CVE-2017-3100 (information disclosure)
A memory corruption vulnerability leading to the disclosure of a memory
address has been found in Adobe Flash Player < 26.0.0.137. It could be
used to bypass some security protections like ASLR.
Impact
======
A remote attacker can execute arbitrary code on the affected host.
References
==========
https://helpx.adobe.com/security/products/flash-player/apsb17-21.html
https://security.archlinux.org/CVE-2017-3080
https://security.archlinux.org/CVE-2017-3099
https://security.archlinux.org/CVE-2017-3100
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170711/a9a4444c/attachment.asc>
More information about the arch-security
mailing list