A vulnerability in Adobe Flash Player could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.
The vulnerability is due to improper memory operations that are performed by the affected software. An attacker could exploit this vulnerability by persuading a user to open an attachment or click a link in a malicious email message. A successful exploit could trigger a use-after-free condition, which could allow the attacker to execute arbitrary code on the targeted system.
Adobe has confirmed the vulnerability and released software updates.
CVE Number – CVE-2018-4877
To exploit this vulnerability, the attacker may use misleading language or instructions to persuade a user to access a link or open an email attachment that submits malicious input to the affected software.
Administrators are advised to apply the appropriate updates.
Users are advised not to open email messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in email messages are safe, they are advised not to open them.
Administrators are advised to monitor affected systems.
Adobe has released software updates at the following links:
- Flash Player Desktop Runtime version 220.127.116.11 for Windows and Macintosh
- Flash Player Desktop Runtime version 18.104.22.168 for Linux
- Flash Player for Google Chrome version 22.214.171.124 for Windows, Macintosh, Linux, and ChromeOS
- Flash Player for Microsoft Edge and Internet Explorer 11 version 126.96.36.199 for Windows 10 and Windows 8.1
FreeBSD has released ports collection updates at the following link: Ports Collection Index
Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.