Lucene search

K
kasperskyKaspersky LabKLA10671
HistorySep 21, 2015 - 12:00 a.m.

KLA10671 Flash Player update for Google Chrome

2015-09-2100:00:00
Kaspersky Lab
threats.kaspersky.com
22

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7 High

AI Score

Confidence

Low

0.809 High

EPSS

Percentile

98.3%

Google Chrome was updated to address vulnerabilities in Flash Player. For details look at KLA10670.

Original advisories

Blog entry

Exploitation

Public exploits exist for this vulnerability.

Related products

Google-Chrome

CVE list

CVE-2015-5573 critical

CVE-2015-5574 critical

CVE-2015-5575 critical

CVE-2015-5576 critical

CVE-2015-5577 critical

CVE-2015-5578 critical

CVE-2015-5579 critical

CVE-2015-5580 critical

CVE-2015-5581 critical

CVE-2015-5582 critical

CVE-2015-5587 critical

CVE-2015-5584 critical

CVE-2015-6676 critical

CVE-2015-5588 critical

CVE-2015-6678 critical

CVE-2015-6677 critical

CVE-2015-6682 critical

CVE-2015-6679 critical

CVE-2015-5567 critical

CVE-2015-5572 critical

CVE-2015-5571 warning

CVE-2015-5570 critical

CVE-2015-5568 critical

Solution

Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk.

Get Chrome

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • WLF

Write Local Files. Exploitation of vulnerabilities with this impact can lead to writing into some inaccessible files. Files that can be read depends on concrete program errors.

Affected Products

  • Google Chrome versions earlier than 45.0.2454.99 (all branches)

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7 High

AI Score

Confidence

Low

0.809 High

EPSS

Percentile

98.3%