Adobe patches remote code execution and keylogging flaws in Flash Player

14.01.2015
Adobe Systems fixed nine vulnerabilities in Flash Player that allow attackers to record users' keystrokes or take complete control of their computers.

These are Flash Player updates you'll want to install, unlike the malicious one served from the North Korean news agency site.

The updates, Flash Player 16.0.0.257 for Windows and Mac and Flash Player 11.2.202.429 for Linux, address seven remote code execution vulnerabilities, an information disclosure flaw that can be exploited to capture keystrokes and a lower-risk file validation issue.

The company also included the fixes in its Flash Player Extended Support Release (ESR), an older Flash Player version used by organizations that prefer stability over new functionality. The updated ESR version is 13.0.0.260.

Users of Google Chrome and Internet Explorer on Windows 8 or 8.1 will automatically receive the Flash Player updates through the update mechanisms of those browsers.

Adobe AIR, a framework for developing and running rich Internet applications, has also been updated because it bundles Flash Player. The AIR desktop runtime was updated to version 16.0.0.245, the AIR SDK (Software Development Kit) and Compiler were updated to version 16.0.0.272 and Adobe AIR for Android was updated to version 16.0.0.272.

Outdated Flash Player browser plug-ins are a common target in drive-by download attacks that install malware through silent exploits hosted on compromised websites. Users should always make sure they're running the latest versions of Flash Player, Java, Silverlight, Adobe Reader and other programs that install browser plug-ins.

Lucian Constantin

Zur Startseite