The recent zero-day vulnerability CVE-2018-15982 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-42 on December 5, 2018 to address this issue. According to Adobe, the in-wild exploit is being used in targeted attacks.
Vulnerable Versions
About the vulnerability
This is a Use after free vulnerability in Adobe Reader which allows attackers to perform a Remote Code Execution on targeted machines. The vulnerability allows for a maliciously crafted Flash object to execute code on a victim’s computer, which enables an attacker to gain command line access to the system. After successful exploitation, attackers can take control of the vulnerable system and executes extracted malware.
Reportedly, the vulnerability is currently being exploited in the wild through a malicious Office document. This Office document is an initial attack vector which executes malicious Flash file. According to the advisory, the malicious office document was spread via spear-phishing attack.
Quick Heal Detection
Quick Heal has released the following detection for the vulnerability CVE-2018-15982:
Quick Heal Security Labs is actively looking for new in-the-wild exploits for this vulnerability and ensuring coverage for them.
References
https://helpx.adobe.com/security/products/flash-player/apsb18-42.html
Subject Matter Experts
Prashant Tilekar |Quick Heal Security Labs
2 Comments
Hi Prashant ji !
Thanks for valuable alert on Adobe Flash Player 31.0.0.153 .
Please advice which version is safe to use on pc.
Regards
Good article and right to the point. I am not sure if this
is truly the best place to ask but do you people
have any thoughts on where to hire some professional writers?
Thx 🙂 https://acecbd.net/