Check Point Reference: | CPAI-2014-2293 |
Date Published: | 10 Dec 2014 |
Severity: | Critical |
Last Updated: | Thursday 11 December, 2014 |
Source: | Adobe APSB14-24 |
Industry Reference: | CVE-2014-0588 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Adobe Flash Player Desktop Runtime 15.0.0.189 and earlier for Windows and Macintosh Adobe Flash Player Extended Support Release 13.0.0.250 and earlier for Windows and Macintosh Adobe Flash Player for Google Chrome 15.0.0.189 and earlier for Windows, Macintosh and Linux Adobe Flash Player for Internet Explorer 10 and Internet Explorer 11 15.0.0.189 and earlier for Windows 8.0 and 8.1 Adobe Flash Player 11.2.202.411 and earlier for Linux Adobe AIR Desktop Runtime 15.0.0.293 and earlier for Windows and Macintosh Adobe AIR for Android 15.0.0.293 and earlier for Android Adobe AIR SDK 15.0.0.302 and earlier for Windows, Macintosh, Android and iOS Adobe AIR SDK and Compiler 15.0.0.302 and earlier for Windows, Macintosh, Android, and iOS |
Vulnerability Description | A remote code execution vulnerability has been reported in Adobe Flash Player. The vulnerability is due to a use-after-free error while loading specially crafted SWF files. A remote attacker can exploit this issue by enticing the victim to open a specially crafted SWF file. |
Update/Patch Avaliable | Apply patches from: APSB14-24 |
This protection will detect and block the transferring of malicious SWF files.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Adobe Flash Protection Violation.
Attack Information: Adobe Flash Player Use After Free Code Execution (APSB14-24: CVE-2014-0588)