Lucian Constantin
CSO Senior Writer

Adobe fixes 18 vulnerabilities in Flash Player

news
Nov 12, 20142 mins

Fifteen of the vulnerabilities addressed in the updates are critical and can result in remote code execution

Adobe Systems released critical security updates Tuesday for Flash Player to address 18 vulnerabilities, many of which can be remotely exploited to compromise underlying systems.

Fifteen of the patched vulnerabilities can result in arbitrary code execution, one can be exploited to disclose session tokens and two allow attackers to escalate their privileges from the low to medium integrity level, Adobe said in a security advisory.

The company advises Windows and Mac users to update to the newly released Flash Player version 15.0.0.223. Linux users should update to Flash Player 11.2.202.418.

The Flash Player Extended Support Release, which is based on Flash Player 13 was also updated to version 13.0.0.252.

The Flash Player plug-ins bundled with Google Chrome and Internet Explorer on Windows 8 and 8.1 will be upgraded automatically through those browsers’ update mechanisms.

Adobe also released new versions of Adobe AIR, the company’s runtime and software development kit (SDK) for rich Internet applications, because it bundles Flash Player. Users of the AIR desktop and Android runtime, as well as users of AIR SDK and AIR SDK & Compiler should update to version 15.0.0.356.

Many of the vulnerabilities patched in these new Flash Player releases were found and reported by researchers from Google, Microsoft, McAfee and Trend Micro.

Adobe said via email that it is not aware of exploits for these vulnerabilities being used in the wild. However, as demonstrated last month, cybercriminals don’t waste a lot of time before they start to attack newly patched Flash Player flaws.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author