Affected software versions include: Adobe Flash Player 16.0.0.296 and earlier versions for Windows and Macintosh, and Adobe Flash Player 13.0.0.264 and earlier 13.x versions.
The new Adobe Flash Player comes only a week after two other 0-Day vulnerabilities in Flash were discovered to have been exploited by the Angler Exploit Kit. Those vulnerabilities were patched with Flash Player 16.0.0.296, which is now an outdated, vulnerable version of Adobe software.
The 0-day vulnerability patched in todays update is described as follows:
CVE-2015-0313 : Unspecified vulnerability in Adobe Flash Player through 13.0.0.264 and 14.x, 15.x, and 16.x through 16.0.0.296 on Windows and OS X and through 11.2.202.440 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in February 2015.
According to Adobe, “Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system. […] [T]his vulnerability is being actively exploited in the wild via drive-by-download attacks against systems running Internet Explorer and Firefox on Windows 8.1 and below.”
Users of Adobe Flash Player for Mac and Windows should update to Adobe Flash Player 16.0.0.305 (14.9 MB) immediately. Adobe said the company is working with their distribution partners to make the update available in Google Chrome and Internet Explorer 10 and 11.
Intego VirusBarrier with up-to-date antivirus definitions detects this 0-day vulnerability as Flash/NuclearEK.