Adobe releases critical security update for Flash Player on Mac… again

“Adobe has released security updates for Flash Player that address critical vulnerabilities that could put Mac users at risk,” Joe Rossignol reports for MacRumors.

“Flash Player version 23.0.0.162 and earlier, Flash Player Extended Support Release version 18.0.0.375 and earlier, and Flash Player for Google Chrome version 23.0.0.162 and earlier are affected on macOS Sierra and OS X,” Rossignol reports.

“Mac users should update to the latest Flash Player version through the built-in update mechanism, or by visiting the Adobe Flash Player Download Center,” Rossignol reports. “The latest vulnerabilities, discovered by Palo Alto Networks, Trend Micro, Tencent, and other researchers, could lead to nondescript “code execution.” Adobe gave the Flash Player updates its top priority rating, meaning that users should update immediately. ”

Read more in the full article here.

MacDailyNews Take: Shocker.

13 Comments

  1. I have basically eliminated flash from my life except for Hulu on my laptop and desktop, and they have no plans to switch like Netflix and everyone else did. Their mobile app uses h.264 why can’t their damned website? Why can’t this stupid plug in just die already.

    1. b9bot: Go into System Preferences/Flash Player/Updates and verify that in the lower third of the window it says:

      NPAPI Plug-in version 23.0.0.185 is installed.

      That’s the new, current version. If you have any version earlier, you need to install the update.

      BTW: Ignore the ‘PPAPI Plug-in…’ rubbish Adobe left in the Flash Player window. It’s Windows rubbish some lazy Adobe coder left in the preference pane. I hate Adobe.

  2. What’s actually critical is the Adobe update for both Reader and Acrobat Pro. The update patches 71 CVE security vulnerabilities. That might be a record.

    At least there weren’t any zero-day exploits this month of Adobe junk. And at least Adobe patches all this crap. How they have patience with the crap results of their crap coding I have no idea. Sheesh.

    Reader & Acrobat Pro v15.020.20039 Patches:
    CVE numbers: CVE-2016-1089, CVE-2016-1091, CVE-2016-6939, CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6947, CVE-2016-6948, CVE-2016-6949, CVE-2016-6950, CVE-2016-6951, CVE-2016-6952, CVE-2016-6953, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6957, CVE-2016-6958, CVE-2016-6959, CVE-2016-6960, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6966, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6970, CVE-2016-6971, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6979, CVE-2016-6988, CVE-2016-6993, CVE-2016-6994, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-6999, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, CVE-2016-7019

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.