First published: Sat Apr 09 2016(Updated: )
Stack-based buffer overflow in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via crafted JPEG-XR data.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Macromedia Flash Player | <=11.2.202.577 | |
Linux Kernel | ||
Adobe Flash Player | <=21.0.0.197 | |
Apple iOS and macOS | ||
Microsoft Windows Operating System | ||
Macromedia Flash Player | <=18.0.0.333 | |
Windows 10 | ||
Microsoft Windows | ||
Macromedia Flash Player | <=21.0.0.197 | |
Macromedia Flash Player | <=21.0.0.197 | |
Chrome OS | ||
Macromedia Flash Player | <=21.0.0.197 | |
Adobe AIR | <=21.0.0.176 | |
Adobe AIR | <=21.0.0.176 | |
iPhone OS | ||
Android | ||
Adobe AIR SDK & Compiler | <=21.0.0.176 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1018 has been classified as a critical vulnerability due to the potential for arbitrary code execution.
To fix CVE-2016-1018, update Adobe Flash Player to a version greater than 18.0.0.343 or 21.0.0.213.
CVE-2016-1018 affects Adobe Flash Player versions prior to 18.0.0.343 and 21.x before 21.0.0.213 on Windows and OS X, and versions before 11.2.202.616 on Linux.
Yes, CVE-2016-1018 can be exploited remotely if a user opens a malicious JPEG-XR file.
The potential consequences of CVE-2016-1018 include unauthorized execution of arbitrary code, which can compromise system security.