[arch-security] [ASA-201705-9] lib32-flashplugin: arbitrary code execution
Remi Gacogne
rgacogne at archlinux.org
Wed May 10 16:39:53 UTC 2017
Arch Linux Security Advisory ASA-201705-9
=========================================
Severity: Critical
Date : 2017-05-09
CVE-ID : CVE-2017-3068 CVE-2017-3069 CVE-2017-3070 CVE-2017-3071
CVE-2017-3072 CVE-2017-3073 CVE-2017-3074
Package : lib32-flashplugin
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-266
Summary
=======
The package lib32-flashplugin before version 25.0.0.171-1 is vulnerable
to arbitrary code execution.
Resolution
==========
Upgrade to 25.0.0.171-1.
# pacman -Syu "lib32-flashplugin>=25.0.0.171-1"
The problems have been fixed upstream in version 25.0.0.171.
Workaround
==========
None.
Description
===========
- CVE-2017-3068 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in the Advanced Video Coding engine of Adobe Flash Player <
25.0.0.171.
- CVE-2017-3069 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in the BlendMode class of Adobe Flash Player < 25.0.0.171.
- CVE-2017-3070 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in the ConvolutionFilter class of Adobe Flash Player <
25.0.0.171.
- CVE-2017-3071 (arbitrary code execution)
A use-after-free vulnerability that could lead to code execution has
been found in Adobe Flash Player < 25.0.0.171, when masking display
object.
- CVE-2017-3072 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in the BitmapData class of Adobe Flash Player < 25.0.0.171.
- CVE-2017-3073 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in Adobe Flash Player < 25.0.0.171, when handling multiple mask
properties of display objects.
- CVE-2017-3074 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been
found in the Graphics class of Adobe Flash Player < 25.0.0.171.
Impact
======
A remote attacker can execute arbitrary code on the affected host.
References
==========
https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
https://security.archlinux.org/CVE-2017-3068
https://security.archlinux.org/CVE-2017-3069
https://security.archlinux.org/CVE-2017-3070
https://security.archlinux.org/CVE-2017-3071
https://security.archlinux.org/CVE-2017-3072
https://security.archlinux.org/CVE-2017-3073
https://security.archlinux.org/CVE-2017-3074
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170510/b97f2893/attachment.asc>
More information about the arch-security
mailing list