Adobe Flash Player Memory Corruption Vulnerability (CVE-2015-0359)
Publish date: June 09, 2016
Severity: CRITICAL
Advisory Date: MAY 07, 2015
DESCRIPTION
Adobe Flash Player is prone to an unspecified memory-corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
TREND MICRO PROTECTION INFORMATION
Apply associated Trend Micro DPI Rules.
SOLUTION
PATCH: https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
Trend Micro Deep Security DPI Rule Number: 1006646
AFFECTED SOFTWARE AND VERSION
- Adobe Flash Player 17.0.0.134 and earlier versions
- Adobe Flash Player 13.0.0.277 and earlier 13.x versions
- Adobe Flash Player 11.2.202.451 and earlier 11.x versions
- AIR Desktop Runtime 17.0.0.144 and earlier versions
- AIR SDK and SDK & Compiler 17.0.0.144 and earlier versions
Featured Stories
- Abusing Argo CD, Helm, and Artifact Hub: An Analysis of Supply Chain Attacks in Cloud-Native ApplicationsWe provide an overview of cloud-native tools and examine how cybercriminals can exploit their vulnerabilities to launch supply chain attacks.Read more
- Trends and Shifts in the Underground N-Day Exploit MarketOur two-year research provides insights into the life cycle of exploits, the types of exploit buyers and sellers, and the business models that are reshaping the underground exploit market.Read more
- The Nightmares of Patch Management: The Status Quo and BeyondWe discuss the challenges that organizations face in managing endpoint and server patches.Read more
- Identifying Weak Parts of a Supply ChainMalicious attacks have consistently been launched on weak points in the supply chain. Like all attacks, these will evolve into more advanced forms. Software development, with multiple phases that could be placed at risk, is particularly vulnerable.Read more