Multiple Memory corruption vulnerabilities that could lead to arbitrary
code execution have been found. These vulnerabilities were discovered by
willJ of Tencent PC Manager, Sébastien Morin of COSIG, Yuki Chen of
Qihoo 360 Vulcan Team, Wen Guanxing from Pangu LAB, and Jie Zeng of
Tencent Zhanlu Lab.
A race condition that could lead to information disclosure has been
discovered. This vulnerability has been discovered by Stefan Kanthak.
Three type confusion vulnerabilities that could lead to arbitrary code
execution have been found. These vulnerabilities were discovered by
Ohara Rinne, Kurutsu Karen, and Garandou Sara working with Trend Micro’s
Zero Day Initiative.
Multiple use-after-free vulnerabilities that could lead to arbitrary
code execution have been found. These vulnerabilities have been
discovered by Nicolas Joly of Microsoft Vulnerability Research, Kai Kang
(a.k.a 4B5F5F4B) working with Trend Micro’s Zero Day Initiative, Jaehun
Jeong(@n3sk) of WINS WSEC Analysis Team working with Trend Micro’s Zero
Day Initiative, and Natalie Silvanovich of Google Project Zero, and Wen
Guanxing from Pangu LAB.
A heap buffer overflow vulnerability that could lead to arbitrary code
execution has been found. This vulnerability has been discovered to
Yuki Chen of Qihoo 360 Vulcan Team working with the Chromium
Vulnerability Rewards Program.
A memory leak vulnerability has been discovered. This vulnerability has
been discovered by Natalie Silvanovich of Google Project Zero.
Two stack corruption vulnerabilities that could lead to arbitrary code
execution have been found. These have been found by Francis Provencher
of COSIG.
A security bypass vulnerability that could lead to information
disclosure has been discovered. These issues have been discovered by
Soroush Dalili and Matthew Evans from NCC Group.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
any | any | any | flashplugin | < 11.2.202.632-1 | UNKNOWN |
access.redhat.com/security/cve/CVE-2016-4173
access.redhat.com/security/cve/CVE-2016-4174
access.redhat.com/security/cve/CVE-2016-4175
access.redhat.com/security/cve/CVE-2016-4176
access.redhat.com/security/cve/CVE-2016-4177
access.redhat.com/security/cve/CVE-2016-4179
access.redhat.com/security/cve/CVE-2016-4180
access.redhat.com/security/cve/CVE-2016-4181
access.redhat.com/security/cve/CVE-2016-4182
access.redhat.com/security/cve/CVE-2016-4183
access.redhat.com/security/cve/CVE-2016-4184
access.redhat.com/security/cve/CVE-2016-4185
access.redhat.com/security/cve/CVE-2016-4186
access.redhat.com/security/cve/CVE-2016-4187
access.redhat.com/security/cve/CVE-2016-4188
access.redhat.com/security/cve/CVE-2016-4189
access.redhat.com/security/cve/CVE-2016-4190
access.redhat.com/security/cve/CVE-2016-4217
access.redhat.com/security/cve/CVE-2016-4218
access.redhat.com/security/cve/CVE-2016-4219
access.redhat.com/security/cve/CVE-2016-4220
access.redhat.com/security/cve/CVE-2016-4221
access.redhat.com/security/cve/CVE-2016-4222
access.redhat.com/security/cve/CVE-2016-4223
access.redhat.com/security/cve/CVE-2016-4224
access.redhat.com/security/cve/CVE-2016-4225
access.redhat.com/security/cve/CVE-2016-4226
access.redhat.com/security/cve/CVE-2016-4227
access.redhat.com/security/cve/CVE-2016-4228
access.redhat.com/security/cve/CVE-2016-4229
access.redhat.com/security/cve/CVE-2016-4230
access.redhat.com/security/cve/CVE-2016-4231
access.redhat.com/security/cve/CVE-2016-4232
access.redhat.com/security/cve/CVE-2016-4233
access.redhat.com/security/cve/CVE-2016-4234
access.redhat.com/security/cve/CVE-2016-4235
access.redhat.com/security/cve/CVE-2016-4236
access.redhat.com/security/cve/CVE-2016-4237
access.redhat.com/security/cve/CVE-2016-4238
access.redhat.com/security/cve/CVE-2016-4239
access.redhat.com/security/cve/CVE-2016-4240
access.redhat.com/security/cve/CVE-2016-4241
access.redhat.com/security/cve/CVE-2016-4242
access.redhat.com/security/cve/CVE-2016-4243
access.redhat.com/security/cve/CVE-2016-4244
access.redhat.com/security/cve/CVE-2016-4245
access.redhat.com/security/cve/CVE-2016-4246
access.redhat.com/security/cve/CVE-2016-4247
access.redhat.com/security/cve/CVE-2016-4248
helpx.adobe.com/security/products/flash-player/apsb16-25.html