First published: Wed Oct 05 2016(Updated: )
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Flash Player | <=22.0.0.192 | |
Apple iOS and macOS | ||
Microsoft Windows | ||
Macromedia Flash Player | <=18.0.0.360 | |
Macromedia Flash Player | <=22.0.0.192 | |
Chrome OS | ||
Linux Kernel | ||
Macromedia Flash Player | <=22.0.0.192 | |
Macromedia Flash Player | <=22.0.0.192 | |
Microsoft Windows 10 | ||
Microsoft Windows 8.1 | ||
Macromedia Flash Player | <=11.2.202.626 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7020 is classified as a critical vulnerability that allows attackers to execute arbitrary code.
To mitigate CVE-2016-7020, ensure that Adobe Flash Player is updated to the latest version, specifically above 22.0.0.209.
CVE-2016-7020 impacts Adobe Flash Player on Windows and macOS, specifically older versions before 18.0.0.366 and 19.x through 22.x before 22.0.0.209.
Yes, CVE-2016-7020 can potentially be exploited remotely, allowing attackers to execute malicious code on targeted systems.
Disabling or uninstalling Adobe Flash Player can serve as a temporary workaround for CVE-2016-7020 until a patch is applied.