Last updated: November 2, 2017
The Adobe Product Security Incident Response Team updated security bulletins for Adobe Flash Player in a blog post today, with one vulnerability patched in Flash Player. Adobe assigned a Critical severity rating to the vulnerability. The vulnerability impacts Windows, Mac, Linux and ChromeOS operating systems running Flash Player 184.108.40.206 (Windows, Mac) and earlier. Refer to the Affected Versions chart for specific product and version information for each platform. The Critical rating means that an exploited vulnerability “would allow malicious native-code to execute, potentially without a user being aware.”
Adobe assigned the Flash Player vulnerability a Priority 1 rating, except for Linux (Priority 3). Vulnerabilities categorized as Priority 1 are either being targeted, or are at a greater risk of being targeted, by exploits that already exist in the wild. Adobe recommends applying the update that resolves the vulnerability as soon as possible by updating to Flash Player 220.127.116.11. Refer to the Solution chart for the specific updated version for each platform.
Certain web browsers, such as Google Chrome and Microsoft Edge, already have Flash Player built-in. As such, Chrome will automatically update itself when new versions of Flash Player are available. Nonetheless, it is always a good practice to check for updates yourself. You are responsible for keeping yourself safe while online.
It has been one month since Adobe last released security updates for Flash Player. On September 12, 2017, Adobe released an update that patched 2 critical vulnerabilities in Flash Player.
References for October 16, 2017, Adobe Flash Player Critical Update
Adobe Security Bulletin: Security updates available for Adobe Flash Player
Adobe PSIRT Blog Post: Security Bulletins posted
US-CERT: Adobe Releases Security Updates
Thank you for visiting Tech Help Knowledgebase to learn about the one vulnerability patched in Flash Player October 2017 update. If you liked this article, follow us on Twitter @techhelpkb and subscribe to our YouTube channel to keep in the loop.
Image Credit: Pixabay / FelixMittermeier