Last updated: October 25, 2017
The Adobe Product Security Incident Response Team updated security bulletins for Adobe Flash Player in a blog post today, with 7 vulnerabilities patched in Flash Player. Adobe assigned a Critical severity rating to the vulnerabilities. The vulnerabilities impact Windows, Mac, Linux and ChromeOS operating systems running Flash Player 220.127.116.11 (Windows, Mac) and earlier. Refer to the Affected Versions chart for specific product and version information for each platform. The Critical rating means that an exploited vulnerability “would allow malicious native-code to execute, potentially without a user being aware.”
Adobe has assigned all the Flash Player vulnerabilities with a Priority 1 rating, except for Linux (Priority 3). Vulnerabilities categorized as Priority 1 are either being targeted, or are at a greater risk of being targeted, by exploits that already exist in the wild. Adobe recommends applying the update that resolves the vulnerabilities as soon as possible by updating to Flash Player 18.104.22.168. Refer to the Solution chart for the specific updated version for each platform.
Certain web browsers, such as Google Chrome and Microsoft Edge, already have Flash Player built-in. As such, Chrome will automatically update itself when new versions of Flash Player are available. Nonetheless, it is always a good practice to check for updates yourself. You are responsible for keeping yourself safe while online.
It has been one month since Adobe last released security updates for Flash Player. On February 14, 2017, Adobe released an update that patched 13 critical vulnerabilities in Flash Player.
References for March 14, 2017, Adobe Flash Player Critical Update
Adobe Security Bulletin: Security updates available for Adobe Flash Player
Adobe PSIRT Blog Post: Security Updates Available for Adobe Flash Player (APSB17-07)
US-CERT: Adobe Releases Security Updates
Thank you for visiting Tech Help Knowledgebase to learn about the 7 vulnerabilities patched in Flash Player in March 2017 update.
Image Credit: Pixabay / Tumisu