Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to alternation functionality. Successful exploitation could lead to arbitrary code execution.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html | vendor advisory broken link |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154 | patch vendor advisory third party advisory |
http://www.securityfocus.com/bid/94871 | broken link third party advisory vdb entry |
https://security.gentoo.org/glsa/201701-17 | third party advisory vendor advisory |
http://www.securitytracker.com/id/1037442 | broken link third party advisory vdb entry |
http://www.zerodayinitiative.com/advisories/ZDI-16-625 | third party advisory vdb entry |
http://rhn.redhat.com/errata/RHSA-2016-2947.html | third party advisory vendor advisory |
https://helpx.adobe.com/security/products/flash-player/apsb16-39.html | patch vendor advisory |
http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html | vendor advisory broken link |