First published: Tue Nov 08 2016(Updated: )
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Flash Player | <=11.2.202.643 | |
Linux Kernel | ||
Macromedia Flash Player | <=23.0.0.205 | |
Apple iOS and macOS | ||
Chrome OS | ||
Microsoft Windows Operating System | ||
Macromedia Flash Player | <=23.0.0.205 | |
Macromedia Flash Player | <=23.0.0.205 | |
Windows 10 | ||
Windows 10 | =1511 | |
Windows 10 | =1607 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Macromedia Flash Player | <=23.0.0.205 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7858 is classified as a critical vulnerability due to its potential to allow arbitrary code execution.
To mitigate CVE-2016-7858, users should update Adobe Flash Player to versions later than 23.0.0.205.
CVE-2016-7858 affects Adobe Flash Player versions 23.0.0.205 and earlier, including 11.2.202.643 and earlier on platforms like Linux and Windows.
Yes, CVE-2016-7858 can be exploited remotely, leading to a risk of compromise when viewing malicious content.
Exploitation of CVE-2016-7858 could result in arbitrary code execution, allowing attackers to run malicious code with the privileges of the user.