Published on: 14 October 2015
 
      
    
         
      
    
Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities caused by various buffer overflow, use-after-free error, memory leak, memory corruption, security bypass and problems in Flash broker and Javascript API. To successfully exploit the vulnerabilities, a remote attacker could entice a targeted user to open a specially crafted PDF file, web page, Flash file, or document that supports embedded Flash content.
A successful attack could lead to arbitrary code execution, information disclosure, bypass of security restrictions or potentially take control of the affected system.
Upgrade Adobe Flash Player to the following versions to address the issues. The upgrade can be obtained by using the auto-update mechanism or by downloading at the following URLs:
If you have multiple browsers, you are required to perform the Adobe Flash Player upgrade for each browser, the Flash Player version can be checked at http://www.adobe.com/software/flash/about/
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
 https://helpx.adobe.com/security/products/acrobat/apsb15-24.html
 https://technet.microsoft.com/library/security/2755801
 https://www.hkcert.org/my_url/en/alert/15101407
 https://www.hkcert.org/my_url/en/alert/15101408
 https://www.us-cert.gov/ncas/current-activity/2015/10/13/Adobe-Releases-Security-Updates-Reader-and-Acrobat
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5569
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5583
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5586
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6683 (to CVE-2015-6725)
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7614 (to CVE-2015-7634)
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7643 (to CVE-2015-7644)