Remote exploitation of a use-after-free vulnerability in Adobe Systems Inc.'s Flash Player could allow an attacker to execute arbitrary code with the privileges of the current user.
Vulnerable Systems:
* Adobe Flash Player version 10.0.22.87
* Adobe Flash Player version 10.0.45.2 and prior
* Adobe AIR version 1.5.3.9130 and prior
The vulnerability takes place during the processing of a certain image type within a certain function. The image is positioned at a location on a linked list. On return from the function, an object is de-allocated and a stale pointer continues to reference the object. Arbitrary code execution can occur when the object is used after it has been de-allocated. Memory that was previously allocated for the object can be reused by an attacker.
Workaround:
A Internet Explorer plugin is available to temporarily block and unblock Flash content using a single click. Only trusted sites should be unblocked when using this plugin.
More information is available at http://flash.melameth.com.