PT-2016-1490 · Adobe +3 · Flash Player +5
Ichinose Kotomi
·
Published
2016-03-10
·
Updated
2023-01-19
·
CVE-2016-0994
9.3
High
Base vector | Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Adobe Flash Player (affected versions not specified)
Adobe Flash Player ESR (affected versions not specified)
Adobe Integrated Runtime (affected versions not specified)
Description:
The issue is related to a use-after-free error, which can be exploited by a remote attacker to execute arbitrary code. This is a result of improper memory usage after it has been freed.
Recommendations:
For Adobe Flash Player, consider disabling the affected component until a patch is available.
For Adobe Flash Player ESR, restrict access to potentially vulnerable modules to minimize the risk of exploitation.
For Adobe Integrated Runtime, avoid using potentially vulnerable functions until the issue is resolved.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Use After Free
Weakness Enumeration
Related Identifiers
Affected Products
References · 157
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0987 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0961 · Security Note
- https://bdu.fstec.ru/vul/2016-00785 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0994 · Security Note
- https://osv.dev/vulnerability/SUSE-SU-2016:0715-1 · Vendor Advisory
- https://osv.dev/vulnerability/UBUNTU-CVE-2016-0994 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0999 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0986 · Security Note
- https://bdu.fstec.ru/vul/2016-00801 · Security Note
- https://osv.dev/vulnerability/SUSE-SU-2016:0716-1 · Vendor Advisory
- https://bdu.fstec.ru/vul/2016-00800 · Security Note
- https://bdu.fstec.ru/vul/2016-00783 · Security Note
- https://bdu.fstec.ru/vul/2016-00789 · Security Note
- https://bdu.fstec.ru/vul/2016-00792 · Security Note