First published: Tue Aug 14 2018(Updated: )
Adobe Flash Player 30.0.0.134 and earlier have a security bypass vulnerability. Successful exploitation could lead to security mitigation bypass.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/flash-plugin | <30.0.0.154 | 30.0.0.154 |
Adobe Flash Player | <=30.0.0.154 | |
Apple Mac OS X | ||
Linux Linux kernel | ||
Microsoft Windows | ||
Adobe Flash Player | <=30.0.0.154 | |
Google Chrome OS | ||
Adobe Flash Player | <=30.0.0.154 | |
Adobe Flash Player | <=30.0.0.154 | |
Microsoft Windows 10 | ||
Microsoft Windows 8.1 | ||
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-12825 is critical with a severity value of 9.8.
The affected software for CVE-2018-12825 includes Adobe Flash Player versions earlier than 30.0.0.154.
The security bypass vulnerability in Adobe Flash Player can be exploited to bypass security mitigations.
To fix the security bypass vulnerability in Adobe Flash Player, update to version 30.0.0.154 or later.
You can find more information about CVE-2018-12825 on the following websites: [SecurityFocus](http://www.securityfocus.com/bid/105070), [SecurityTracker](http://www.securitytracker.com/id/1041448), and [Red Hat Advisory](https://access.redhat.com/errata/RHSA-2018:2435).