First published: Thu Jun 16 2016(Updated: )
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
Adobe Flash Player | <=21.0.0.242 | |
Apple iOS and macOS | ||
Microsoft Windows | ||
Adobe Acrobat Reader | <=11.2.202.621 | |
Linux Kernel | ||
Adobe Acrobat Reader | <=18.0.0.352 | |
Microsoft Windows 10 | ||
Microsoft Windows 8.1 | ||
Adobe Acrobat Reader | <=21.0.0.242 | |
Adobe Acrobat Reader | <=21.0.0.242 | |
Chrome OS | ||
Adobe Acrobat Reader | <=21.0.0.242 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
SUSE Linux Enterprise Desktop with Beagle | =12 | |
SUSE Linux Enterprise Desktop with Beagle | =12-sp1 | |
SUSE Linux Enterprise Workstation Extension | =12 | |
SUSE Linux Enterprise Workstation Extension | =12-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-4122 is currently unknown as the impact and attack vectors have not been specified.
To fix CVE-2016-4122, it is recommended to update Adobe Flash Player to a version later than 21.0.0.242.
CVE-2016-4122 affects Adobe Flash Player versions 21.0.0.242 and earlier when used in certain Red Hat Enterprise Linux and Microsoft Internet Explorer environments.
Yes, if your application uses Adobe Flash Player version 21.0.0.242 or earlier, it may be vulnerable to CVE-2016-4122.
A temporary workaround for CVE-2016-4122 is to disable or uninstall the affected version of Adobe Flash Player until an update can be applied.