Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class for specific search strategies. Successful exploitation could lead to arbitrary code execution.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html | vendor advisory broken link |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154 | third party advisory patch vendor advisory |
http://www.securityfocus.com/bid/94871 | vdb entry third party advisory broken link |
https://security.gentoo.org/glsa/201701-17 | third party advisory vendor advisory |
http://www.zerodayinitiative.com/advisories/ZDI-16-623 | vdb entry third party advisory |
http://www.securitytracker.com/id/1037442 | vdb entry third party advisory broken link |
http://rhn.redhat.com/errata/RHSA-2016-2947.html | third party advisory vendor advisory |
https://helpx.adobe.com/security/products/flash-player/apsb16-39.html | patch vendor advisory |
http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html | vendor advisory broken link |