Published on: 14 October 2015
Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities caused by various buffer overflow, use-after-free error, memory leak, memory corruption, security bypass and problems in Flash broker and Javascript API. To successfully exploit the vulnerabilities, a remote attacker could entice a targeted user to open a specially crafted PDF file, web page, Flash file, or document that supports embedded Flash content.
A successful attack could lead to arbitrary code execution, information disclosure, bypass of security restrictions or potentially take control of the affected system.
Upgrade Adobe Flash Player to the following versions to address the issues. The upgrade can be obtained by using the auto-update mechanism or by downloading at the following URLs:
If you have multiple browsers, you are required to perform the Adobe Flash Player upgrade for each browser, the Flash Player version can be checked at http://www.adobe.com/software/flash/about/
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
https://helpx.adobe.com/security/products/acrobat/apsb15-24.html
https://technet.microsoft.com/library/security/2755801
https://www.hkcert.org/my_url/en/alert/15101407
https://www.hkcert.org/my_url/en/alert/15101408
https://www.us-cert.gov/ncas/current-activity/2015/10/13/Adobe-Releases-Security-Updates-Reader-and-Acrobat
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5583
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5586
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6683 (to CVE-2015-6725)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7614 (to CVE-2015-7634)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7643 (to CVE-2015-7644)