Security update for adobe flash player что это такое
Adobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS. These updates address a critical vulnerability in Adobe Flash Player. Successful exploitation could lead to an exploitable crash, potentially resulting in arbitrary code execution in the context of the current user.
Affected Product Versions
Product | Version | Platform |
Adobe Flash Player Desktop Runtime | 32.0.0.433 and earlier | Windows, macOS and Linux |
Adobe Flash Player for Google Chrome | 32.0.0.433 and earlier | Windows, macOS, Linux and Chrome OS |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 | 32.0.0.387 and earlier | Windows 10 and 8.1 |
To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right- click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the latest version:
- Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows, macOS and Linux update to Adobe Flash Player 32.0.0.445 via the update mechanism within the product [1] or by visiting the Adobe Flash Player Download Center.
- Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 32.0.0.445 for Windows, macOS, Linux and Chrome OS.
- Adobe Flash Player installed with Microsoft Edge and Internet Explorer 11 for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 32.0.0.445.
- Please visit the Flash Player Help page for assistance in installing Flash Player.
[1] Users who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.
Vulnerability details
Vulnerability Category | Vulnerability Impact | Severity | CVE Number |
NULL Pointer Dereference | Arbitrary Code Execution | Critical | CVE-2020-9746 |
Это обновление для системы безопасности устраняет уязвимости в проигрывателе Adobe Flash, установленном в любой из операционных систем Windows, перечисленных в разделе "относится к".
Дополнительные сведения об этих уязвимостях можно найти в ADV200003.
Все обновления для системы безопасности и незащищенных обновлений для Windows Server 2012 R2, Windows 8,1 и Windows RT 8,1 требуют установки обновления KB2919355. Рекомендуем установить Обновление KB2919355 на компьютере под управлением windows Server 2012 R2, Windows 8,1 или windows RT 8,1, чтобы получать последующие обновления.
Если после установки этого обновления вы установили языковой пакет, необходимо повторно установить это обновление. Поэтому мы рекомендуем установить все необходимые языковые пакеты, прежде чем устанавливать это обновление. Дополнительные сведения можно найти в разделе Добавление пакетов поддержки языков в Windows.
Если вы хотите установить обновление Adobe Flash Player в более ранней версии Windows, попробуйте загрузить проигрыватель Adobe Flash Player.
Получение и установка обновления
Способ 1: обновление Windows
Это обновление доступно с помощью центра обновления Windows. При включении автоматического обновления это обновление будет загружено и установлено автоматически. Дополнительные сведения об автоматическом получении обновлений для системы безопасности можно найти в центре обновления Windows: вопросы и ответы. Примечания.
Для Windows RT 8,1 это обновление доступно только с помощью центра обновления Windows.
Для Windows Server 2016 и Windows 10 версии 1607 может быть не установлено автоматическое обновление. Чтобы получить это обновление, выполните указанные ниже действия.
Способ 2: Каталог Центра обновления Майкрософт
Чтобы получить автономный пакет для этого обновления, перейдите на веб-сайт каталога Центра обновления Майкрософт .
Обнаружение и развертывание
Инструменты для обнаружения и развертывания и руководствоВы можете управлять программным обеспечением и обновлениями для системы безопасности, которые нужно развернуть на серверах, настольных компьютерах и мобильных системах в Организации. Дополнительные сведения можно найти в центре управления обновлениями TechNet. Вы можете скачать обновления для системы безопасности из каталога Центра обновления Майкрософт. Каталог Центра обновления Майкрософт предоставляет доступный для поиска каталог контента, доступ к которому осуществляется с помощью центра обновления Windows и центра обновления Майкрософт. Сюда входят обновления для системы безопасности, драйверы и пакеты обновления. Дополнительные сведения можно найти в статье вопросы и ответы по каталогу Центра обновления Майкрософт.
Рекомендации по определению наличия и развертыванию
Корпорация Майкрософт предоставляет рекомендации по обнаружению и развертыванию обновлений для системы безопасности. В этом руководстве содержатся рекомендации и информация, которая может помочь ИТ-специалистам понять, как использовать различные инструменты для обнаружения и развертывания обновлений для системы безопасности. Дополнительные сведения можно найти в статье Microsoft Knowledge Base KB961747.
Microsoft Baseline Security Analyzer
Microsoft Baseline Security Analyzer (MBSA) позволяет администраторам проверять локальные и удаленные системы на предмет отсутствующих обновлений для системы безопасности и распространенных конфигураций безопасности. Дополнительные сведения можно найти в разделе Microsoft Baseline Security Analyzer.
Службы Windows Server Update Services
Службы Windows Server Update Services (WSUS) позволяют администраторам информационных технологий развертывать последние обновления продуктов Майкрософт на компьютерах с операционной системой Windows. Дополнительные сведения о том, как развертывать обновления для системы безопасности с помощью WSUS, можно найти в следующем разделе Microsoft TechNet:
Systems Management Server
В таблице ниже приведены сведения об обнаружении и развертывании этого обновления для системы безопасности (Microsoft Systems Management Server (SMS).
SMS 2003 со средством ITMU
System Center Configuration Manager
Windows 8,1 для 32-разрядных систем
Windows 8,1 для 64-разрядных систем
Windows Server 2012 и Windows Server 2012 R2
Примечание. Корпорация Майкрософт прекращена поддержка SMS 2,0 на 12 апреля 2011 г. Для SMS 2003 Корпорация Майкрософт также прекращена поддержка средств инвентаризации обновлений для системы безопасности (SUIT) на 12 апреля 2011 г. Клиентам рекомендуется перейти на System Center Configuration Manager. Для SMS 2003 для поиска обновлений для системы безопасности, поддерживаемых службами Windows Server Update Services, можно использовать SMS 2003 для обновлений Майкрософт (ITMU). Дополнительные сведения можно найти в разделе Systems Management Server 2003. Для определения обновлений System Center Configuration Manager использует WSUS 3,0. Дополнительные сведения можно найти в разделе Библиотека документации разработчиков System Center.
Обновление средства оценки совместимости и набора средств для обеспечения совместимости приложений Обновления часто записываются в те же файлы и параметры реестра, необходимые для запуска приложений. Это может вызвать несовместимость и увеличивать время, необходимое для развертывания обновлений для системы безопасности. Вы можете упростить тестирование и проверку обновлений Windows для установленных приложений с помощью компонентов оценщик совместимости обновлений , которые включены в набор средств для обеспечения совместимости приложений (ACT). ACT для Windows 10 входит в комплект средств для развертывания и оценки Windows (Windows ADK). Набор средств для обеспечения совместимости приложений включает в себя необходимые средства и документацию для оценки и уменьшения проблем с совместимостью приложений перед развертыванием обновления Windows, обновления для системы безопасности Майкрософт или новой версии Windows Internet Explorer на вашем среды.
Сведения о развертывании этого обновления для системы безопасности можно найти в следующей статье базы знаний Майкрософт:
Информация о файлах для Windows 10, версия 1903 и 1909
Атрибуты файлов
В версии этого обновления программного обеспечения для английского языка (США) устанавливаются файлы с атрибутами, указанными в приведенных ниже таблицах.
Adobe Flash Player will go out of support by December 31, 2020. For more information, see Adobe Flash end of support on December 31, 2020.
Adobe Flash Player on Windows 10 for 32-bit Systems
Adobe Flash Player on Windows 10 for x64-based Systems
Adobe Flash Player on Windows 10, version 1607 for 32-bit Systems
Adobe Flash Player on Windows 10, version 1607 for x64-based Systems
Adobe Flash Player on Windows 10, version 1709 for 32-bit Systems
Adobe Flash Player on Windows 10, version 1709 for ARM64-based Systems
Adobe Flash Player on Windows 10, version 1709 for x64-based Systems
Adobe Flash Player on Windows 10, version 1803 for 32-bit Systems
Adobe Flash Player on Windows 10, version 1803 for ARM64-based Systems
Adobe Flash Player on Windows 10, version 1803 for x64-based Systems
Adobe Flash Player on Windows 10, version 1809 for 32-bit Systems
Adobe Flash Player on Windows 10, version 1809 for ARM64-based Systems
Adobe Flash Player on Windows 10, version 1809 for x64-based Systems
Adobe Flash Player on Windows 10, version 1903 for 32-bit Systems
Adobe Flash Player on Windows 10, version 1903 for ARM64-based Systems
Adobe Flash Player on Windows 10, version 1903 for x64-based Systems
Adobe Flash Player on Windows 10, version 1909 for 32-bit Systems
Adobe Flash Player on Windows 10, version 1909 for ARM64-based Systems
Adobe Flash Player on Windows 10, version 1909 for x64-based Systems
Adobe Flash Player on Windows 10, version 2004 for 32-bit Systems
Adobe Flash Player on Windows 10, version 2004 for ARM64-based Systems
Adobe Flash Player on Windows 10, version 2004 for x64-based Systems
Adobe Flash Player on Windows 8.1 for 32-bit systems
Adobe Flash Player on Windows 8.1 for x64-based systems
Adobe Flash Player on Windows RT 8.1
Adobe Flash Player on Windows Server 2012
Adobe Flash Player on Windows Server 2012 R2
Adobe Flash Player on Windows Server 2016
Adobe Flash Player on Windows Server 2019
This security update resolves vulnerabilities in Adobe Flash Player that is installed on any of the Windows operating systems that are listed in the "Applies to" section.
To learn more about these vulnerabilities, see ADV200010.
All security and nonsecurity updates for Windows Server 2012 R2, Windows 8.1, and Windows RT 8.1 require the installation of update KB2919355. We recommend that you install update KB2919355 on your Windows Server 2012 R2-based, Windows 8.1-based, or Windows RT 8.1-based computer so that you receive future updates.
If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
If you want to install the Adobe Flash Player update on an earlier version of Windows, try Adobe Flash Player download.
Known issues in this update
We are currently not aware of any issues in this update.
How to obtain and install the update
Method 1: Windows Update
This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
For Windows RT 8.1, this update is available through Windows Update only.
For Windows Server 2016 and Windows 10, version 1607, the updates may not be installed automatically. To get this update, follow these steps:
Select Start, and then type Check for updates.
Select Check for updates.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Detection and deployment
You can manage the software and security updates that you have to deploy to the servers, desktops, and mobile systems in your organization. For more information, go to the TechNet Update Management Center.
You can download security updates from the Microsoft Update Catalog. The Microsoft Update Catalog provides a searchable catalog of content that is made available through Windows Update and Microsoft Update. This includes security updates, drivers, and service packs. For more information, see Microsoft Update Catalog FAQ.
Detection and deployment guidance
Microsoft provides detection and deployment guidance for security updates. This guidance contains recommendations and information that can help IT professionals understand how to use various tools for detection and deployment of security updates. For more information, see Microsoft Knowledge Base article KB 961747.
Microsoft Baseline Security Analyzer
Microsoft Baseline Security Analyzer (MBSA) enables administrators to scan local and remote systems for missing security updates and common security misconfigurations. For more information, see Microsoft Baseline Security Analyzer.
Windows Server Update Services
Windows Server Update Services (WSUS) enables information technology administrators to deploy the latest Microsoft product updates to computers that are running Windows. For more information about how to deploy security updates by using WSUS, see the following Microsoft TechNet topic:
Systems Management Server
The following table provides the Microsoft Systems Management Server (SMS) detection and deployment summary for this security update.
SMS 2003 with ITMU
System Center Configuration Manager
Windows 8.1 for 32-bit systems
Windows 8.1 for 64-bit systems
Windows Server 2012 and Windows Server 2012 R2
Note Microsoft discontinued support for SMS 2.0 on April 12, 2011. For SMS 2003, Microsoft also discontinued support for the Security Update Inventory Tool (SUIT) on April 12, 2011. Customers are encouraged to upgrade to System Center Configuration Manager.
For SMS 2003, the SMS 2003 Inventory Tool for Microsoft Updates (ITMU) can be used by SMS to detect security updates that are supported by Windows Server Update Services. For more information, see Systems Management Server 2003.
System Center Configuration Manager uses WSUS 3.0 to detect updates. For more information, see System Center Developer Documentation Library.
Update Compatibility Evaluator and Application Compatibility Toolkit
Updates frequently write to the same files and registry settings that are required for your applications to run. This can trigger incompatibilities and increase the time that is required to deploy security updates. You can streamline the testing and validation of Windows updates against installed applications by using the Update Compatibility Evaluator components that are included in the Application Compatibility Toolkit (ACT). The ACT for Windows 10 is included in the Windows Assessment and Deployment Kit (Windows ADK).
The Application Compatibility Toolkit contains the necessary tools and documentation to evaluate and decrease application compatibility issues before you deploy a Windows update, a Microsoft security update, or a new version of Windows Internet Explorer in your environment.
For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:
Windows 10, version 2004
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Windows 10, version 1903 and 1909
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Windows 10, version 1809 and Windows Server 2019
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Windows 10, version 1803
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Windows 10, version 1709
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Windows 10, version 1703
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Windows 10, version 1607 and Windows Server 2016
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Windows 10 (initial version released July 2015)
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Note The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
Windows Server 2012
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Note The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
Learn about the terminology that Microsoft uses to describe software updates.
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
Affected versions
Product | Affected Versions | Platform |
---|---|---|
Adobe Flash Player Desktop Runtime | 25.0.0.127 and earlier | Windows, Macintosh and Linux |
Adobe Flash Player for Google Chrome | 25.0.0.127 and earlier | Windows, Macintosh, Linux and Chrome OS |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 | 25.0.0.127 and earlier | Windows 10 and 8.1 |
- To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product | Updated Versions | Platform | Priority rating | Availability |
---|---|---|---|---|
Adobe Flash Player Desktop Runtime | 25.0.0.148 | Windows and Macintosh | 1 | Flash Player Download Center Flash Player Distribution |
Adobe Flash Player for Google Chrome | 25.0.0.148 | Windows, Macintosh, Linux and Chrome OS | 1 | Google Chrome Releases |
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 | 25.0.0.148 | Windows 10 and 8.1 | 1 | Microsoft Security Advisory |
Adobe Flash Player Desktop Runtime | 25.0.0.148 | Linux | 3 | Flash Player Download Center |
- Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows, Macintosh and Linux update to Adobe Flash Player 25.0.0.148 via the update mechanism within the product [1] or by visiting the Adobe Flash Player Download Center.
- Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 25.0.0.148 for Windows, Macintosh, Linux and Chrome OS.
- Adobe Flash Player installed with Microsoft Edge and Internet Explorer 11 for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 25.0.0.148.
- Please visit the Flash Player Help page for assistance in installing Flash Player.
[1] Users who have selected the option to 'Allow Adobe to install updates' will receive the update automatically. Users who do not have the 'Allow Adobe to install updates' option enabled can install the update via the update mechanism within the product when prompted.
Vulnerability Details
- These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2017-3058, CVE-2017-3059, CVE-2017-3062, CVE-2017-3063).
- These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2017-3060, CVE-2017-3061, CVE-2017-3064).
Acknowledgments
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
Adobe would like to thank the following individuals and organizations for reporting these issues and for working with Adobe to help protect our customers:
Читайте также: