{"id":87089,"date":"2018-12-06T16:22:25","date_gmt":"2018-12-06T10:52:25","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87089"},"modified":"2018-12-06T16:22:25","modified_gmt":"2018-12-06T10:52:25","slug":"cve-2018-15982-adobe-flash-player-use-free-zero-day-vulnerability-alert","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/cve-2018-15982-adobe-flash-player-use-free-zero-day-vulnerability-alert\/","title":{"rendered":"CVE-2018-15982- Adobe Flash Player use after free (Zero Day) vulnerability alert!"},"content":{"rendered":"<p>The recent zero-day vulnerability CVE-2018-15982 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-42 on December 5, 2018 to address this issue. According to Adobe, the in-wild exploit is being used in targeted attacks.<\/p>\n<p><strong><b>Vulnerable Versions<\/b><\/strong><\/p>\n<ul>\n<li>Adobe Flash Player 31.0.0.153 and earlier versions for Desktop Runtime, Google Chrome, Microsoft Edge and Internet Explorer 11.<\/li>\n<li>Adobe Flash Player 31.0.0.108 and earlier for Installer.<\/li>\n<\/ul>\n<p><strong><b>About the vulnerability<\/b><\/strong><\/p>\n<p>This is a Use after free vulnerability in Adobe Reader which allows attackers to perform a Remote Code Execution on targeted machines. The vulnerability allows for a maliciously crafted Flash object to execute code on a victim\u2019s computer, which enables an attacker to gain command line access to the system. After successful exploitation, attackers can take control of the vulnerable system and executes extracted malware.<\/p>\n<p>Reportedly, the vulnerability is currently being exploited in the wild through a malicious Office document. This Office document is an initial attack vector which executes malicious Flash file. According to the advisory, the malicious office document was spread via spear-phishing attack.<\/p>\n<p><strong><b>Quick Heal <\/b><\/strong><strong><b>D<\/b><\/strong><strong><b>etection <\/b><\/strong><\/p>\n<p>Quick Heal has released the following detection for the vulnerability CVE-2018-15982:<\/p>\n<ul>\n<li>Exp.SWF.CVE-2018-15982.A<\/li>\n<li>Exp.SWF.CVE-2018-15982.B<\/li>\n<li>Exp.SWF.CVE-2018-15982.SL<\/li>\n<\/ul>\n<p>Quick Heal Security Labs is actively looking for new in-the-wild exploits for this vulnerability and ensuring coverage for them.<\/p>\n<p><strong><b>References<\/b><\/strong><\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb18-42.html\"><u>https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb18-42.html<\/u><\/a><\/p>\n<p><strong><b>Subject Matter Experts<\/b><\/strong><\/p>\n<p>Prashant Tilekar |Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recent zero-day vulnerability CVE-2018-15982 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-42 on December 5, 2018 to address this issue. According to Adobe, the in-wild exploit is being used in targeted attacks. Vulnerable Versions Adobe Flash Player 31.0.0.153 and earlier [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":87092,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70,289,36,1395],"tags":[718,705],"class_list":["post-87089","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-adobe","category-cyber-safety","category-security-patch","category-vulnerability","tag-zero-day","tag-zero-day-vulnerability"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87089"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87089"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87089\/revisions"}],"predecessor-version":[{"id":87096,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87089\/revisions\/87096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/87092"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}