Arch Linux Security Advisory ASA-201506-5
========================================
Severity: Critical
Date    : 2015-06-24
CVE-ID  : CVE-2015-3113
Package : flashplugin
Type    : remote code execution
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE

Summary
======
The package flashplugin before version 11.2.202.468-1 is vulnerable to
remote code execution.

Resolution
=========
Upgrade to 11.2.202.468-1.

# pacman -Syu "flashplugin>=11.2.202.468-1"

The problem has been fixed upstream in version 11.2.202.468.

Workaround
=========
This issue can be mitigated by disabling the flash plugin.

Description
==========
A heap-based buffer overflow has been found in the FLV handling of Adobe
Flash Player, leading to code execution.

Impact
=====
A remote attacker may be able to execute arbitrary code on a vulnerable
host.

References
=========
https://helpx.adobe.com/support/programs/support-options-free-discontinued-apps-services.html
https://www.mandiant.com/resources/blog/operation-clandestine-wolf-adobe-flash-zero-day
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3113

ArchLinux: 201506-5: flashplugin: remote code execution

June 24, 2015

Summary

A heap-based buffer overflow has been found in the FLV handling of Adobe Flash Player, leading to code execution.

Resolution

Upgrade to 11.2.202.468-1. # pacman -Syu "flashplugin>=11.2.202.468-1"
The problem has been fixed upstream in version 11.2.202.468.

References

https://helpx.adobe.com/support/programs/support-options-free-discontinued-apps-services.html https://www.mandiant.com/resources/blog/operation-clandestine-wolf-adobe-flash-zero-day https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3113

Severity
Package : flashplugin
Type : remote code execution
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE

Workaround

This issue can be mitigated by disabling the flash plugin.

Related News