First published: Sat Apr 09 2016(Updated: )
Untrusted search path vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows local users to gain privileges via a Trojan horse resource in an unspecified directory.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Macromedia Flash Player | <=11.2.202.577 | |
Linux Kernel | ||
Adobe Flash Player | <=21.0.0.197 | |
Apple iOS and macOS | ||
Microsoft Windows | ||
Macromedia Flash Player | <=18.0.0.333 | |
Microsoft Windows 10 | ||
Microsoft Windows 8.1 | ||
Macromedia Flash Player | <=21.0.0.197 | |
Macromedia Flash Player | <=21.0.0.197 | |
Chrome OS | ||
Macromedia Flash Player | <=21.0.0.197 | |
Adobe AIR | <=21.0.0.176 | |
Adobe AIR | <=21.0.0.176 | |
iStyle @cosme iPhone OS | ||
Android | ||
Adobe AIR SDK & Compiler | <=21.0.0.176 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1014 is rated as a high-severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2016-1014, update Adobe Flash Player to versions 18.0.0.344 or later, or 21.0.0.214 or later.
CVE-2016-1014 affects users of Adobe Flash Player versions prior to 18.0.0.344 and between 19.0.0.0 and 21.0.0.214 on Windows and OS X, and before 11.2.202.616 on Linux.
An untrusted search path vulnerability allows malicious users to manipulate application resource loading to execute arbitrary code in a privileged context.
Exploiting CVE-2016-1014 can lead to privilege escalation, where an attacker gains unauthorized access to system resources.