Published on: 11 January 2017
Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities caused by heap buffer overflow, use-after-free error, security bypass, memory corruption, and type confusion. To successfully exploit the vulnerabilities, a remote attacker could entice a targeted user to open a specially crafted PDF file, web page, Flash file, or document that supports embedded Flash content.
A successful exploitation could lead to arbitrary code execution, information disclosure, bypass of security restrictions or potentially take control of the affected system.
Upgrade Adobe Flash Player and Adobe Acrobat and Reader to the following versions to address the issues. The upgrade can be obtained by using the auto-update mechanism or by downloading at the following URLs:
If you have multiple browsers, you are required to perform the Adobe Flash Player upgrade for each browser, the Flash Player version can be checked at
http://www.adobe.com/software/flash/about/
https://helpx.adobe.com/security/products/acrobat/apsb17-01.html
https://helpx.adobe.com/security/products/flash-player/apsb17-02.html
https://support.microsoft.com/en-us/kb/321462
https://www.hkcert.org/my_url/en/alert/17011102
https://www.us-cert.gov/ncas/current-activity/2017/01/10/Adobe-Releases-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2925 (to CVE2017-2928)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2930 (to CVE2017-2967)