CIS CYBER SECURITY ADVISORIES
MS-ISAC CYBER SECURITY ADVISORY NUMBER:
Multiple vulnerabilities found in Adobe Flash Player and Adobe AIR could allow an attacker to execute code remotely. (APSB14-22)
Multiple vulnerabilities in Adobe Flash Player and Adobe AIR could allow remote code execution. Adobe Flash Player is a widely distributed multimedia and application player used to enhance the user experience when visiting web pages or reading email messages. Adobe AIR is a cross platform runtime used for developing Internet applications that run outside of a browser.
Successful exploitation could result in an attacker compromising data security, potentially allowing access to confidential data, or could compromise processing resources in a user's computer. Failed exploit attempts will likely cause denial-of-service conditions.
There are currently no reports of these vulnerabilities being exploited in the wild.
- Adobe Flash Player 126.96.36.199 and earlier versions
- Adobe Flash Player 188.8.131.52 and earlier 13.x versions
- Adobe Flash Player 184.108.40.2066 and earlier versions for Linux
- Adobe AIR desktop runtime 220.127.116.11 and earlier versions
- Adobe AIR SDK 18.104.22.168 and earlier versions
- Adobe AIR SDK & Compiler 22.214.171.124 and earlier versions
- Adobe AIR 126.96.36.199 and earlier versions for Android
- Large and medium government entities: High
- Small government entities: High
- Large and medium business entities: High
- Small business entities: High
Home users: High
Adobe Flash Player is prone to multiple vulnerabilities that could allow for remote code execution. These vulnerabilities are as follows:
- Memory corruption vulnerabilities that could lead to code execution (CVE-2014-0564, CVE-2014-0558).
- Integer overflow vulnerability that could lead to code execution (CVE-2014-0569).
Successful exploitation could result in an attacker compromising data security, potentially allowing access to confidential data, or could compromise processing resources in a user's computer.
We recommend the following actions be taken:
- Install the updates provided by Adobe immediately after appropriate testing.
- Remind users not to visit websites or follow links provided by unknown or untrusted sources. Do not open email attachments from unknown or untrusted sources.
- Limit user account privileges to those required only.