FYI...
Flash 28.0.0.137 released
- https://helpx.adobe.com/security/pro...apsb18-01.html
Jan 9, 2018
"Summary: Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address an important out-of-bounds read vulnerability that could lead to information exposure...
Solution: ... Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows, Macintosh and Linux update to Adobe Flash Player 28.0.0.137 via the update mechanism within the product [1] or by visiting the Adobe Flash Player Download Center:
- https://get.adobe.com/flashplayer/
Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 28.0.0.137 for Windows, Macintosh, Linux and Chrome OS.
Adobe Flash Player installed with Microsoft Edge and Internet Explorer 11 for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 28.0.0.137.
Please visit the Flash Player Help page* for assistance in installing Flash Player:
* https://helpx.adobe.com/flash-player.html
[1] Users who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted..."
For I/E - some versions get 'Automatic' updates:
- https://fpdownload.macromedia.com/pu..._player_ax.exe
For Firefox and other Plugin-based browsers:
- https://fpdownload.macromedia.com/pu...ash_player.exe
For Chrome:
- https://fpdownload.macromedia.com/pu...ayer_ppapi.exe
Flash test site: https://www.adobe.com/software/flash/about/
___
- https://www.us-cert.gov/ncas/current...s-Flash-Player
Jan 09, 2018
___
- https://www.securitytracker.com/id/1040155
CVE Reference: CVE-2018-4871
Jan 10 2018
Impact: Disclosure of system information, Disclosure of user information
Fix Available: Yes Vendor Confirmed: Yes ...
Impact: A remote user can obtain potentially sensitive information on the target system.
Solution: The vendor has issued a fix (28.0.0.137)...