Adobe.Flash.ASSetPropFlags.Method.Handling.Use.After.Free
Description
This indicates an attack attempt to exploit a Use-After-Free vulnerability in Adobe Flash.
The vulnerability is due to an error when the vulnerable software attempts to access an object that has been deleted. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted SWF file.
Affected Products
Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier for Windows and Macintosh
Adobe Flash Player Extended Support Release 18.0.0.268 and earlier for Windows and Macintosh
Adobe Flash Player for Google Chrome 20.0.0.228 and earlier for Windows, Macintosh, Linux and ChromeOS
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and earlier for Windows 10
Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and earlier for Windows 8.0 and 8.1
Adobe Flash Player for Linux 11.2.202.554 and earlier for Linux
AIR Desktop Runtime 20.0.0.204 and earlier for Windows and Macintosh
AIR SDK 20.0.0.204 and earlier for Windows, Macintosh, Android and iOS
AIR SDK & Compiler 20.0.0.204 and earlier for Windows, Macintosh, Android and iOS
AIR for Android 20.0.0.204 and earlier for Android
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-07 | 14.628 | Severity:critical:high |