Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class for specific search strategies. Successful exploitation could lead to arbitrary code execution.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/flash-player/apsb16-39.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/94871 | Broken Link Third Party Advisory VDB Entry |
http://www.zerodayinitiative.com/advisories/ZDI-16-623 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037442 | Broken Link Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2016-2947.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html | Broken Link |
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html | Broken Link |
https://security.gentoo.org/glsa/201701-17 | Third Party Advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Information
Published : 2016-12-14 22:59
Updated : 2022-11-16 14:02
NVD link : CVE-2016-7870
Mitre link : CVE-2016-7870
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
adobe
- flash_player_desktop_runtime
- flash_player
microsoft
- windows
- windows_8.1
- windows_10
- chrome_os
linux
- linux_kernel
apple
- mac_os_x