First published: Tue Aug 14 2018(Updated: )
Adobe Flash Player 30.0.0.134 and earlier have a security bypass vulnerability. Successful exploitation could lead to security mitigation bypass.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/flash-plugin | <30.0.0.154 | 30.0.0.154 |
Adobe Flash Player for Internet Explorer 11 | <=30.0.0.154 | |
Apple Mac OS X | ||
Linux Kernel | ||
Microsoft Windows | ||
Adobe Flash Player for Internet Explorer 11 | <=30.0.0.154 | |
Google Chrome OS | ||
Adobe Flash Player for Internet Explorer 11 | <=30.0.0.154 | |
Adobe Flash Player for Internet Explorer 11 | <=30.0.0.154 | |
Microsoft Windows 10 | ||
Microsoft Windows 8.1 | ||
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-12825 is critical with a severity value of 9.8.
The affected software for CVE-2018-12825 includes Adobe Flash Player versions earlier than 30.0.0.154.
The security bypass vulnerability in Adobe Flash Player can be exploited to bypass security mitigations.
To fix the security bypass vulnerability in Adobe Flash Player, update to version 30.0.0.154 or later.
You can find more information about CVE-2018-12825 on the following websites: [SecurityFocus](http://www.securityfocus.com/bid/105070), [SecurityTracker](http://www.securitytracker.com/id/1041448), and [Red Hat Advisory](https://access.redhat.com/errata/RHSA-2018:2435).