Published on: 08 April 2016
Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by memory layout randomisation problem, type confusion, security bypass, use-after-free, stack overflow and memory corruption errors. A remote attacker could entice a targeted user to open a specially crafted web page, Flash file, or document that supports embedded Flash content to exploit the vulnerabilities.
It is reported that the vulnerability CVE-2016-1019 is being actively exploited for Windows systems running Flash Player version 20.0.0.306 and earlier.
A successful attack could lead to arbitrary code execution or security restrictions bypass.
Upgrade Adobe Flash Player to the following versions to address the issues. The upgrade can be obtained by using the auto-update mechanism or by downloading at the following URLs:
If you have multiple browsers, you are required to perform the Adobe Flash Player upgrade for each browser, the Flash Player version can be checked at http://www.adobe.com/software/flash/about/
https://helpx.adobe.com/security/products/flash-player/apsb16-10.html
https://www.hkcert.org/my_url/en/alert/16040701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1006
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1011 (to CVE-2016-1033)