MS KB3079777: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has a browser plugin installed that is
affected by multiple remote code execution vulnerabilities.

Description :

The remote Windows host is missing KB3079777. It is, therefore,
affected by multiple remote code execution vulnerabilities :

- A use-after-free error exists in the opaqueBackground
class in the ActionScript 3 (AS3) implementation. A
remote attacker, via specially crafted Flash content,
can dereference already freed memory, resulting in the
execution of arbitrary code. (CVE-2015-5122)

- A use-after-free error exists in the BitmapData class in
the ActionScript 3 (AS3) implementation. A remote
attacker, via specially crafted Flash content, can
dereference already freed memory, resulting in the
execution of arbitrary code. (CVE-2015-5123)

See also :

https://helpx.adobe.com/security/products/flash-player/apsb15-18.html
https://support.microsoft.com/en-us/kb/3079777

Solution :

Install Microsoft KB3079777.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:H/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 84809 ()

Bugtraq ID: 75710
75712

CVE ID: CVE-2015-5122
CVE-2015-5123

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now