MS KB3061904: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer

critical Nessus Plugin ID 83369

Synopsis

The remote Windows host has a browser plugin installed that is affected by multiple vulnerabilities.

Description

The remote Windows host is missing KB3061904. It is, therefore, affected by the following vulnerabilities :

- An unspecified security bypass vulnerability exists that allows an attacker to disclose sensitive information.
(CVE-2015-3044)

- Multiple unspecified type confusion flaws exist that allow an attacker to execute arbitrary code.
(CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)

- Multiple memory corruption flaws exist due to improper validation of user-supplied input. A remote attacker can exploit these flaws, via specially crafted flash content, to corrupt memory and execute arbitrary code.
(CVE-2015-3078, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)

- An unspecified security bypass exists that allows an unauthenticated, remote attacker to disclose sensitive information. (CVE-2015-3079)

- An unspecified use-after-free error exists that allows an attacker to execute arbitrary code. (CVE-2015-3080)

- An unspecified time-of-check time-of-use (TOCTOU) race condition exists that allows an attacker to bypass Protected Mode for Internet Explorer. (CVE-2015-3081)

- Multiple validation bypass vulnerabilities exist that allow an attacker to read and write arbitrary data to the file system. (CVE-2015-3082, CVE-2015-3083, CVE-2015-3085)

- An integer overflow condition exists due to improper validation of user-supplied input. This allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2015-3087)

- A heap-based buffer overflow exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-3088)

- Multiple unspecified memory leaks exist that allow an attacker to bypass the Address Space Layout Randomization (ASLR) feature. (CVE-2015-3091, CVE-2015-3092)

Solution

Install Microsoft KB3061904.

See Also

https://support.microsoft.com/en-us/help/3061904/microsoft-security-advisory-update-for-vulnerabilities-in-adobe-flash

https://helpx.adobe.com/security/products/flash-player/apsb15-09.html

https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/2755801

Plugin Details

Severity: Critical

ID: 83369

File Name: smb_kb3061904.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 5/12/2015

Updated: 11/22/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-3093

Vulnerability Information

CPE: cpe:/o:microsoft:windows, cpe:/a:adobe:flash_player

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/12/2015

Vulnerability Publication Date: 5/12/2015

Exploitable With

Core Impact

Metasploit (Adobe Flash Player ShaderJob Buffer Overflow)

Reference Information

CVE: CVE-2015-3044, CVE-2015-3077, CVE-2015-3078, CVE-2015-3079, CVE-2015-3080, CVE-2015-3081, CVE-2015-3082, CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087, CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3091, CVE-2015-3092, CVE-2015-3093

BID: 74608, 74609, 74610, 74612, 74613, 74617, 74605, 74614, 74616

MSKB: 3061904