Vulnerability Note VU#748992

Adobe Flash memory corruption vulnerability

Original Release date: 15 Jun 2016 | Last revised: 16 Jun 2016


Adobe Flash contains an unspecified vulnerability that is currently being exploited in the wild.


Adobe Flash Player and earlier contain an unspecified vulnerability that an allow a remote, unauthenticated attacker to execute arbitrary code. This vulnerability is being exploited in the wild. Please see Adobe Security Advisory APSA16-03 for more details.


By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), PDF file, Microsoft Office document, or any other document that supports embedded SWF content, an attacker may be able to execute arbitrary code. The vulnerability reportedly affects Flash Player and earlier versions for Windows, Macintosh, Linux, and Chrome OS.


Apply an update

This issue is addressed in Flash Player versions,, and Please see Adobe Security Bulletin APSB16-18 for more details.

Disable flash in your web browser

Adobe has provide guidance for how to configure Flash in various web browsers. Via the appropriate browser settings, configure Flash to be disabled or at the very least configure Flash to only execute when it is clicked.

Uninstall Flash

Adobe has provided guidance for how to uninstall Flash Player on Windows and how to uninstall Flash Player on the Mac.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
AdobeAffected-16 Jun 2016
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal 7.1 E:F/RL:U/RC:C
Environmental 7.1 CDP:ND/TD:H/CR:ND/IR:ND/AR:ND



This vulnerability was reported by Adobe, who in turn credits Anton Ivanov and Costin Raiu of Kaspersky Lab.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2016-4171
  • Date Public: 14 Jun 2016
  • Date First Published: 15 Jun 2016
  • Date Last Updated: 16 Jun 2016
  • Document Revision: 7


If you have feedback, comments, or additional information about this vulnerability, please send us email.