First published: Sat Dec 09 2017(Updated: )
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK. The mismatch between an old and a new object can provide an attacker with unintended memory access -- potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Adobe Flash Player | <=27.0.0.183 | |
Apple macOS | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Adobe Flash Player | <=27.0.0.183 | |
Google Chrome OS | ||
Adobe Flash Player | <=27.0.0.183 | |
Adobe Flash Player | <=27.0.0.183 | |
Microsoft Windows 10 | ||
Microsoft Windows 8.1 | ||
Google Chrome | <65.0.3325.146 | 65.0.3325.146 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-11215 is a vulnerability discovered in Adobe Flash Player 27.0.0.183 and earlier versions.
CVE-2017-11215 has a severity rating of 9.8, which is considered critical.
CVE-2017-11215 impacts Adobe Flash Player versions up to and including 27.0.0.183.
CVE-2017-11215 can be exploited through a use after free vulnerability in the Primetime SDK, which allows for unintended memory access and potential code execution.
You can find more information about CVE-2017-11215 at the following references: [link1], [link2], [link3].