Security Advisory - September 12, 2017

Zscaler protects against 2 new vulnerabilities for Adobe Flash Player

 

 

Zscaler, working with Microsoft through their MAPP program, has proactively deployed protections for the following 2 vulnerabilities included in the September 2017 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the September release and deploy additional protections as necessary.

APSB17-28 – Security updates available for Adobe Flash Player

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.

Severity: Important
Affected Software

  • Adobe Flash Player Desktop Runtime 26.0.0.151 and earlier for Windows, Macintosh and Linux
  • Adobe Flash Player for Google Chrome 26.0.0.151 and earlier for Windows, Macintosh, Linux and Chrome OS
  • Adobe Flash Player for Microsoft Edge and Internet Explorer 11 26.0.0.151 and earlier for Windows 10 and 8.1

Subscriptions Required

  • Advanced Cloud Sandbox

CVE-2017-11281 – Flash Player Memory Corruption Vulnerability

This vulnerability is an instance of a memory corruption vulnerability in the MP4 atom parser. Specifically, the vulnerability is triggered by a crafted MP4 file that contains an invalid atom size data in a tag definition. Subsequent computation does not check whether buffer access is within the previously allocated bounds. It causes an out of bounds memory access, which sometimes triggers access violation exception. Attackers can exploit the vulnerability by using the out of bounds access for unintended reads, writes or frees -- potentially leading to code corruption, control-flow hijack, or information leak attack.

CVE-2017-11282 – Flash Player Memory Corruption Vulnerability

This vulnerability is an instance of a memory corruption vulnerability in the text handling functionality. Specifically, the vulnerability is triggered by a crafted SWF file that contains malformed manipulation of the text field object. It causes an out of bounds memory access, which sometimes triggers access violation exception. Attackers can exploit the vulnerability by using the out of bounds access for unintended reads, writes or frees -- potentially leading to code corruption, control-flow hijack, or information leak attack.