Adobe released an update for Flash Player to fix a critical remote code execution vulnerability that is actively being targeted by attackers.
The vulnerability could allow an attacker to remotely take control of an affected system, Adobe said in a security advisory published Tuesday.
The vulnerability is identified as CVE-2014-0497 on the Common Vulnerabilities and Exposures list and is classified as an integer underflow. It can be exploited to execute arbitrary code on the system.
"Adobe is aware of reports that an exploit for this vulnerability exists in the wild, and recommends users update their product installations to the latest versions."
The company released Flash Player 22.214.171.124 for Windows and Mac and 126.96.36.1996 for Linux. The Flash Player versions included in Google Chrome and Internet Explorer 10 and 11 will be automatically updated through the respective update mechanisms of those browsers.
It's not clear where and how the exploit for this vulnerability was discovered, but the phrase "in the wild" suggests it might have been used in attacks.
In its security advisory Adobe credits Alexander Polyakov and Anton Ivanov from antivirus vendor Kaspersky Lab with reporting the vulnerability. Kaspersky Lab did not immediately respond to an inquiry seeking more information about the exploit and where it was found.
Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.