Use-after-free vulnerability in Adobe Flash Player before 23.0.0.205 on Windows and OS X and before 11.2.202.643 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in October 2016.
References
Link | Resource |
---|---|
https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html | Third Party Advisory |
https://helpx.adobe.com/security/products/flash-player/apsb16-36.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/93861 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201610-10 | Third Party Advisory |
http://www.securitytracker.com/id/1037111 | Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2016-2119.html | Third Party Advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-128 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
Information
Published : 2016-11-01 15:59
Updated : 2019-05-16 10:14
NVD link : CVE-2016-7855
Mitre link : CVE-2016-7855
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
microsoft
- windows
- windows_rt_8.1
- windows_10
- windows_8.1
- windows_server_2012
- chrome_os
linux
- linux_kernel
apple
- mac_os_x
adobe
- flash_player