Discover Government News

Arch Linux Security Advisory ASA-201705-8
========================================
Severity: Critical
Date    : 2017-05-09
CVE-ID  : CVE-2017-3068 CVE-2017-3069 CVE-2017-3070 CVE-2017-3071
          CVE-2017-3072 CVE-2017-3073 CVE-2017-3074
Package : flashplugin
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-265

Summary
======
The package flashplugin before version 25.0.0.171-1 is vulnerable to
arbitrary code execution.

Resolution
=========
Upgrade to 25.0.0.171-1.

# pacman -Syu "flashplugin>=25.0.0.171-1"

The problems have been fixed upstream in version 25.0.0.171.

Workaround
=========
None.

Description
==========
- CVE-2017-3068 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the Advanced Video Coding engine of Adobe Flash Player <
25.0.0.171.

- CVE-2017-3069 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the BlendMode class of Adobe Flash Player < 25.0.0.171.

- CVE-2017-3070 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the ConvolutionFilter class of Adobe Flash Player <
25.0.0.171.

- CVE-2017-3071 (arbitrary code execution)

A use-after-free vulnerability that could lead to code execution has
been found in Adobe Flash Player < 25.0.0.171, when masking display
object.

- CVE-2017-3072 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the BitmapData class of Adobe Flash Player < 25.0.0.171.

- CVE-2017-3073 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in Adobe Flash Player < 25.0.0.171, when handling multiple mask
properties of display objects.

- CVE-2017-3074 (arbitrary code execution)

A memory corruption vulnerability leading to code execution has been
found in the Graphics class of Adobe Flash Player < 25.0.0.171.

Impact
=====
A remote attacker can execute arbitrary code on the affected host.

References
=========
https://helpx.adobe.com/support/programs/support-options-free-discontinued-apps-services.html
https://security.archlinux.org/CVE-2017-3068
https://security.archlinux.org/CVE-2017-3069
https://security.archlinux.org/CVE-2017-3070
https://security.archlinux.org/CVE-2017-3071
https://security.archlinux.org/CVE-2017-3072
https://security.archlinux.org/CVE-2017-3073
https://security.archlinux.org/CVE-2017-3074

ArchLinux: 201705-8: flashplugin: arbitrary code execution

May 10, 2017

Summary

- CVE-2017-3068 (arbitrary code execution) A memory corruption vulnerability leading to code execution has been found in the Advanced Video Coding engine of Adobe Flash Player < 25.0.0.171.
- CVE-2017-3069 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been found in the BlendMode class of Adobe Flash Player < 25.0.0.171.
- CVE-2017-3070 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been found in the ConvolutionFilter class of Adobe Flash Player < 25.0.0.171.
- CVE-2017-3071 (arbitrary code execution)
A use-after-free vulnerability that could lead to code execution has been found in Adobe Flash Player < 25.0.0.171, when masking display object.
- CVE-2017-3072 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been found in the BitmapData class of Adobe Flash Player < 25.0.0.171.
- CVE-2017-3073 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been found in Adobe Flash Player < 25.0.0.171, when handling multiple mask properties of display objects.
- CVE-2017-3074 (arbitrary code execution)
A memory corruption vulnerability leading to code execution has been found in the Graphics class of Adobe Flash Player < 25.0.0.171.

Resolution

Upgrade to 25.0.0.171-1. # pacman -Syu "flashplugin>=25.0.0.171-1"
The problems have been fixed upstream in version 25.0.0.171.

References

https://helpx.adobe.com/support/programs/support-options-free-discontinued-apps-services.html https://security.archlinux.org/CVE-2017-3068 https://security.archlinux.org/CVE-2017-3069 https://security.archlinux.org/CVE-2017-3070 https://security.archlinux.org/CVE-2017-3071 https://security.archlinux.org/CVE-2017-3072 https://security.archlinux.org/CVE-2017-3073 https://security.archlinux.org/CVE-2017-3074

Severity
CVE-2017-3072 CVE-2017-3073 CVE-2017-3074
Package : flashplugin
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-265

Workaround

None.

Related News