Adobe Flash Player Version 30.0.0.134

Sicherheit[German]Adobe released an update for the Flash Player on July 10, 2018, which upgrades it to version 30.0.0.134. The update closes two vulnerabilities, one of which is critical.


Advertising


Adobe Security Bulletin APSB18-24

Adobe Security Bulletin APSB18-24 indicates the priority of the update with 2. The update closes two vulnerabilities:

  • CVE-2018-5007: The Type Confusion vulnerability classified as critical and allows code execution.
  • CVE-2018-5008: An out-of-bounds read vulnerability allows information retrieval and has been identified as important.

These vulnerabilities should be resolved by updating the Adobe Flash Player.

Adobes Flash Player Version 30.0.0.134

Adobe Flash Player version 30.0.0.134 is provided for Windows, Macintosh, Linux and Chrome OS platforms. The following, older Flash versions are affected.

Product Version Platform
Adobe Flash Player Desktop Runtime 30.0.0.113 and earlier versions Windows, macOS, Linux
Adobe Flash Player for Google Chrome 30.0.0.113 and earlier versions Windows, Macintosh, Linux and Chrome OS
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 30.0.0.113 and earlier versions Windows 10 and 8.1

Check for update in Google Chrome

Chrome Browser browser should automatically install the update. You can also check for updates manually by typing chrome://components in the browser’s address bar.

Flash-Version in Google Chrome


Advertising

Which Flash Player version is installed?

The installed Flash version can be checked on this Adobe website., but note, that Flash is deactivated by default in most browsers. The page says also, which Flash version is available at Adobe for the update. 

Flash Player

If you upgrade Flash Player from this Adobe website, make sure you do not install the optional offerings (McAfee Security Scan Plus and True Key from Intel).


Advertising


This entry was posted in Security, Update and tagged , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *