Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class when handling conversion to an object. Successful exploitation could lead to arbitrary code execution.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/flash-player/apsb16-39.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/94873 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037442 | Broken Link Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2016-2947.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html | Broken Link |
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html | Broken Link |
https://security.gentoo.org/glsa/201701-17 | Third Party Advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Information
Published : 2016-12-14 22:59
Updated : 2022-11-16 13:41
NVD link : CVE-2016-7881
Mitre link : CVE-2016-7881
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
adobe
- flash_player_desktop_runtime
- flash_player
microsoft
- windows
- windows_8.1
- windows_10
- chrome_os
linux
- linux_kernel
apple
- mac_os_x