Hi @ll,
the executable installers of Flash Player released 2016-06-15
fixed CVE-2016-1014 in the second attempt, but another vulnerability
remained: they create(d) and use(d) UNSAFE temporary subdirectories
into which they copy/ied themselves and extract(ed) a file "fpb.tmp"
which they load(ed) and execute(d) later with elevated privileges.
An unprivileged user can/could overwrite both files between creation
and execution and gain elevation of privilege.
See <https://cwe.mitre.org/data/definitions/379.html> for this type
of well-known and well-documented vulnerability!
stay tuned
Stefan Kanthak
Timeline:
~~~~~~~~~
2016-03-12 initial report sent to Adobe PSIRT
2016-03-13 Adobe PSIRT acknowledges vulnerability and assigns
PSIRT-4904
2016-04-06 Adobe PSIRT informs about CVE assigned and upcoming
fix scheduled for release later that week
2016-04-17 notification sent to Adobe PSIRT: fix is incomplete,
vulnerability persists
2016-04-17 Adobe PSIRT acknowledges receipt of second report
2016-04-17 Adobe PSIRT acknowledges vulnerability ... again
2016-06-17 Adobe released fixed Flash Player (un)installers,
report for CVE-2016-1014 published
2016-06-17 new report sent to Adobe PSIRT: unsafe TEMP
directory allows escalation of privilege
2016-06-17 Adobe PSIRT acknowledges receipt
2016-06-17 Adobe PSIRT acknowledges vulnerability and assigns
PSIRT-5480
2016-07-10 Adobe PSIRT informs about CVE assigned and upcoming
fix scheduled for release later this week
2016-07-12 Adobe released fixed Flash Player (un)installers,
report for CVE-2016-4247 published