ID

VAR-201111-0264


CVE

CVE-2011-2460


TITLE

Adobe Flash Player and Adobe AIR Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-002866

DESCRIPTION

Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, and CVE-2011-2459. Failed exploit attempts will likely result in denial-of-service conditions. The product enables viewing of applications, content and video across screens and browsers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2011:1445-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1445.html Issue date: 2011-11-11 CVE Names: CVE-2011-2445 CVE-2011-2450 CVE-2011-2451 CVE-2011-2452 CVE-2011-2453 CVE-2011-2454 CVE-2011-2455 CVE-2011-2456 CVE-2011-2457 CVE-2011-2459 CVE-2011-2460 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. These vulnerabilities are detailed on the Adobe security page APSB11-28, listed in the References section. Multiple security flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially-crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the specially-crafted SWF content. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 752983 - flash-plugin: mulitple code execution flaws (APSB11-28) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-10.3.183.11-1.el5.i386.rpm x86_64: flash-plugin-10.3.183.11-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-10.3.183.11-1.el5.i386.rpm x86_64: flash-plugin-10.3.183.11-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-10.3.183.11-1.el6.i686.rpm x86_64: flash-plugin-10.3.183.11-1.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-10.3.183.11-1.el6.i686.rpm x86_64: flash-plugin-10.3.183.11-1.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-10.3.183.11-1.el6.i686.rpm x86_64: flash-plugin-10.3.183.11-1.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-2445.html https://www.redhat.com/security/data/cve/CVE-2011-2450.html https://www.redhat.com/security/data/cve/CVE-2011-2451.html https://www.redhat.com/security/data/cve/CVE-2011-2452.html https://www.redhat.com/security/data/cve/CVE-2011-2453.html https://www.redhat.com/security/data/cve/CVE-2011-2454.html https://www.redhat.com/security/data/cve/CVE-2011-2455.html https://www.redhat.com/security/data/cve/CVE-2011-2456.html https://www.redhat.com/security/data/cve/CVE-2011-2457.html https://www.redhat.com/security/data/cve/CVE-2011-2459.html https://www.redhat.com/security/data/cve/CVE-2011-2460.html https://access.redhat.com/security/updates/classification/#critical http://www.adobe.com/support/security/bulletins/apsb11-28.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOvQ7YXlSAg2UNWIIRAnjKAJ9IBGUxIPb3wKrfMJ+365x1fi4VCgCfRQ3T zthsykex3oM7jAzeyW7KUa0= =VH9O -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . For more information: SA46818 2) A double free error exists in the Theora decoder. 3) Some errors in the MKV and Vorbis media handlers can be exploited to perform an out of bounds read. 7) A use-after-free error exists within certain editing functionality. 8) The application fails to ask for permission when running some JRE7 applets. SOLUTION: Update to version 15.0.874.120. PROVIDED AND/OR DISCOVERED BY: 8) Chris Evans, Google Chrome Security Team. The vendor also credits: 2, 3, 5) Aki Helin, OUSPG. 4) Andrew Scherkus, Chromium development community. 6) Ken \x93strcpy\x94 Russell, Chromium development community. 7) pa_kt via ZDI. Background ========== The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers referenced below for details. Furthermore, a remote attacker may be able to bypass intended access restrictions, bypass cross-domain policy, inject arbitrary web script, or obtain sensitive information. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.228" References ========== [ 1 ] CVE-2011-2445 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2445 [ 2 ] CVE-2011-2450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2450 [ 3 ] CVE-2011-2451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2451 [ 4 ] CVE-2011-2452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2452 [ 5 ] CVE-2011-2453 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2453 [ 6 ] CVE-2011-2454 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2454 [ 7 ] CVE-2011-2455 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2455 [ 8 ] CVE-2011-2456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2456 [ 9 ] CVE-2011-2457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2457 [ 10 ] CVE-2011-2458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2458 [ 11 ] CVE-2011-2459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2459 [ 12 ] CVE-2011-2460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2460 [ 13 ] CVE-2012-0752 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0752 [ 14 ] CVE-2012-0753 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0753 [ 15 ] CVE-2012-0754 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0754 [ 16 ] CVE-2012-0755 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0755 [ 17 ] CVE-2012-0756 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0756 [ 18 ] CVE-2012-0767 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0767 [ 19 ] CVE-2012-0768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0768 [ 20 ] CVE-2012-0769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0769 [ 21 ] CVE-2012-0773 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0773 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201204-07.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- SC World Congress, New York, USA, 16 November 2011 Visit the Secunia booth (#203) and discover how you can improve your handling of third party programs: http://secunia.com/resources/events/sc_2011/ ---------------------------------------------------------------------- TITLE: Adobe Flash Player Multiple Vulnerabilities SECUNIA ADVISORY ID: SA46818 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46818/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46818 RELEASE DATE: 2011-11-11 DISCUSS ADVISORY: http://secunia.com/advisories/46818/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46818/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46818 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. 1) An unspecified error can be exploited to corrupt memory. 2) An unspecified error can be exploited to cause a heap-based buffer overflow. 3) An unspecified error can be exploited to corrupt memory. 4) An unspecified error can be exploited to corrupt memory. 5) An unspecified error can be exploited to corrupt memory. 6) An unspecified error can be exploited to corrupt memory. 7) An unspecified error can be exploited to corrupt memory. 8) An unspecified error can be exploited to cause a buffer overflow. 9) An unspecified error can be exploited to cause a stack-based buffer overflow. 10) An unspecified error can be exploited to bypass the cross-domain policy. Note: This vulnerability affects users running Internet Explorer only. 11) An unspecified error can be exploited to corrupt memory. 12) An unspecified error can be exploited to corrupt memory. Successful exploitation of vulnerabilities #1 through #9, #11, and #12 may allow execution of arbitrary code. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Ivan Golenkov and Alexander Gostev, Kaspersky Lab 2-6, 9, 12) Tavis Ormandy, Google Security Team 7) Bo Qu, Palo Alto Networks 8) Ben Hawkes, Google Security Team 10) lakehu, Tencent Security Center 11) anonymous via iDefense Labs ORIGINAL ADVISORY: http://www.adobe.com/support/security/bulletins/apsb11-28.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, gain knowledge of potentially sensitive information, bypass certain security restrictions, and compromise a user's system

Trust: 2.52

sources: NVD: CVE-2011-2460 // JVNDB: JVNDB-2011-002866 // BID: 50628 // VULHUB: VHN-50405 // PACKETSTORM: 106861 // PACKETSTORM: 106870 // PACKETSTORM: 106863 // PACKETSTORM: 111931 // PACKETSTORM: 106902 // PACKETSTORM: 111985

AFFECTED PRODUCTS

vendor:adobemodel:flash playerscope:ltversion:11.1.102.59

Trust: 1.0

vendor:adobemodel:airscope:ltversion:3.1.0.4880

Trust: 1.0

vendor:adobemodel:airscope:gteversion:3.0

Trust: 1.0

vendor:adobemodel:flash playerscope:gteversion:11.0

Trust: 1.0

vendor:adobemodel:flash playerscope:gteversion:10.0

Trust: 1.0

vendor:adobemodel:flash playerscope:ltversion:10.3.183.11

Trust: 1.0

vendor:adobemodel:flash playerscope:ltversion:11.1.102.55

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:10.1.95.1

Trust: 0.9

vendor:adobemodel:flash playerscope:eqversion:10.1.52.14.1

Trust: 0.9

vendor:adobemodel:flash playerscope:eqversion:10.0.32.18

Trust: 0.9

vendor:adobemodel:flash playerscope:eqversion:10.0.12.36

Trust: 0.9

vendor:adobemodel:flash playerscope:eqversion:10.0.15.3

Trust: 0.9

vendor:adobemodel:flash playerscope:eqversion:10.1.92.10

Trust: 0.9

vendor:adobemodel:flash playerscope:eqversion:10.1.102.64

Trust: 0.9

vendor:adobemodel:flash playerscope:ltversion:for android

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:11.x

Trust: 0.8

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 0.8

vendor:oraclemodel:solarisscope:eqversion:11

Trust: 0.8

vendor:adobemodel:flash playerscope:eqversion:11.1.102.55

Trust: 0.8

vendor:adobemodel:flash playerscope:eqversion:11.1.102.59

Trust: 0.8

vendor:adobemodel:airscope:eqversion:3.0.0.408

Trust: 0.6

vendor:adobemodel:airscope:eqversion:3.1.0.485

Trust: 0.6

vendor:adobemodel:airscope:eqversion:2.7.0.1948

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.246.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.12.35

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.21

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.115.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.280

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp4scope:eqversion:10

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.25

Trust: 0.3

vendor:hpmodel:systems insight managerscope:neversion:7.0

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.156.12

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.95.2

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:11.1.102.55

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.155.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.33

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.22

Trust: 0.3

vendor:hpmodel:systems insight manager sp6scope:eqversion:5.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.51.66

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.13

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.27

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.153.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.262.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.2460

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.22

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.0.0.96

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.157.51

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.26

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.14

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.92.8

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7

Trust: 0.3

vendor:redmodel:hat enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.52.15

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.262

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.32

Trust: 0.3

vendor:adobemodel:airscope:neversion:3.1.0.4880

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.24

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.3

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:4.2

Trust: 0.3

vendor:hpmodel:systems insight manager sp3scope:eqversion:5.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.16

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:4.2

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:5.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.18

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.28.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.260.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.23

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.277.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.7

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:4.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.283.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.21

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.3218

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.289.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.53.64

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.0

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.25

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.124.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.34

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.23

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.152.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.22.87

Trust: 0.3

vendor:redmodel:hat enterprise linux server supplementaryscope:eqversion:6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.85.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.82.76

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:11

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.452

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:5.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.159.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.10

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.151.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.0.1.152

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:11

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.31.0

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.159.1

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:hpmodel:systems insight manager sp5scope:eqversion:5.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.105.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.47.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.45.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.42.34

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.48.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:5.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.4

Trust: 0.3

vendor:adobemodel:flash player release candidascope:eqversion:10.1

Trust: 0.3

vendor:adobemodel:flash player for androidscope:neversion:11.1.102.59

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.28

Trust: 0.3

vendor:hpmodel:systems insight manager updatescope:eqversion:5.31

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.5

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.106.16

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.5.1

Trust: 0.3

vendor:adobemodel:flash player for androidscope:eqversion:11.0.1.153

Trust: 0.3

vendor:redmodel:hat enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.102.65

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.6

Trust: 0.3

sources: BID: 50628 // JVNDB: JVNDB-2011-002866 // CNNVD: CNNVD-201111-235 // NVD: CVE-2011-2460

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-2460
value: HIGH

Trust: 1.0

NVD: CVE-2011-2460
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201111-235
value: CRITICAL

Trust: 0.6

VULHUB: VHN-50405
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-2460
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-50405
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-50405 // JVNDB: JVNDB-2011-002866 // CNNVD: CNNVD-201111-235 // NVD: CVE-2011-2460

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-50405 // JVNDB: JVNDB-2011-002866 // NVD: CVE-2011-2460

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 111931 // CNNVD: CNNVD-201111-235

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201111-235

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002866

PATCH

title:APSB11-28url:http://www.adobe.com/support/security/bulletins/apsb11-28.html

Trust: 0.8

title:cpsid_92374url:http://kb2.adobe.com/jp/cps/923/cpsid_92374.html

Trust: 0.8

title:APSB11-28url:http://www.adobe.com/jp/support/security/bulletins/apsb11-28.html

Trust: 0.8

title:GLSA 201204-07url:http://www.gentoo.org/security/en/glsa/glsa-201204-07.xml

Trust: 0.8

title:HPSBMU02769 SSRT100846url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03298151

Trust: 0.8

title:multiple_vulnerabilities_in_adobe_flashplayer4url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_adobe_flashplayer4

Trust: 0.8

sources: JVNDB: JVNDB-2011-002866

EXTERNAL IDS

db:NVDid:CVE-2011-2460

Trust: 3.0

db:SECUNIAid:48819

Trust: 1.2

db:JVNDBid:JVNDB-2011-002866

Trust: 0.8

db:CNNVDid:CNNVD-201111-235

Trust: 0.7

db:SECUNIAid:46815

Trust: 0.7

db:SECUNIAid:46792

Trust: 0.7

db:SECUNIAid:46818

Trust: 0.7

db:NSFOCUSid:18169

Trust: 0.6

db:NSFOCUSid:18171

Trust: 0.6

db:BIDid:50628

Trust: 0.4

db:VULHUBid:VHN-50405

Trust: 0.1

db:PACKETSTORMid:106861

Trust: 0.1

db:PACKETSTORMid:106870

Trust: 0.1

db:PACKETSTORMid:106863

Trust: 0.1

db:PACKETSTORMid:111931

Trust: 0.1

db:PACKETSTORMid:106902

Trust: 0.1

db:PACKETSTORMid:111985

Trust: 0.1

sources: VULHUB: VHN-50405 // BID: 50628 // JVNDB: JVNDB-2011-002866 // PACKETSTORM: 106861 // PACKETSTORM: 106870 // PACKETSTORM: 106863 // PACKETSTORM: 111931 // PACKETSTORM: 106902 // PACKETSTORM: 111985 // CNNVD: CNNVD-201111-235 // NVD: CVE-2011-2460

REFERENCES

url:http://www.adobe.com/support/security/bulletins/apsb11-28.html

Trust: 2.2

url:http://security.gentoo.org/glsa/glsa-201204-07.xml

Trust: 1.3

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14260

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a15836

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-1445.html

Trust: 1.1

url:http://secunia.com/advisories/48819

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00019.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00017.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00014.html

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2460

Trust: 0.8

url:https://www.jpcert.or.jp/at/2011/at110030.txt

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2460

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics\\

Trust: 0.8

url:http://secunia.com/advisories/46792

Trust: 0.6

url:http://secunia.com/advisories/46815

Trust: 0.6

url:http://secunia.com/advisories/46818

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18171

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18169

Trust: 0.6

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.4

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.4

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.4

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.4

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.4

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.4

url:http://www.adobe.com

Trust: 0.3

url:http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_adobe_flashplayer4

Trust: 0.3

url:http://secunia.com/resources/events/sc_2011/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-2457

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2455

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2454

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2450

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2456

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2451

Trust: 0.2

url:https://rhn.redhat.com/errata/rhsa-2011-1445.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2459

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2445

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2453

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2452

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2460

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2011-2453.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2451.html

Trust: 0.1

url:https://access.redhat.com/kb/docs/doc-11259

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2452.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2455.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2456.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2460.html

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2445.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2454.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2459.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2450.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2457.html

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:http://bugzilla.redhat.com/):

Trust: 0.1

url:http://secunia.com/advisories/46815/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46815

Trust: 0.1

url:http://secunia.com/advisories/46815/

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html

Trust: 0.1

url:http://secunia.com/advisories/46792/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46792

Trust: 0.1

url:http://secunia.com/advisories/46792/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0755

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0754

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2454

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0769

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0753

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0755

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2458

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0756

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0754

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2458

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0768

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2456

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2453

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0769

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0773

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0767

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2455

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0773

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0756

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0753

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2459

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2457

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2451

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2445

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0767

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0768

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2460

Trust: 0.1

url:http://secunia.com/advisories/46818/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46818

Trust: 0.1

url:http://secunia.com/advisories/46818/

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/48819/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48819

Trust: 0.1

url:http://secunia.com/advisories/48819/#comments

Trust: 0.1

sources: VULHUB: VHN-50405 // BID: 50628 // JVNDB: JVNDB-2011-002866 // PACKETSTORM: 106861 // PACKETSTORM: 106870 // PACKETSTORM: 106863 // PACKETSTORM: 111931 // PACKETSTORM: 106902 // PACKETSTORM: 111985 // CNNVD: CNNVD-201111-235 // NVD: CVE-2011-2460

CREDITS

Secunia

Trust: 0.4

sources: PACKETSTORM: 106870 // PACKETSTORM: 106863 // PACKETSTORM: 106902 // PACKETSTORM: 111985

SOURCES

db:VULHUBid:VHN-50405
db:BIDid:50628
db:JVNDBid:JVNDB-2011-002866
db:PACKETSTORMid:106861
db:PACKETSTORMid:106870
db:PACKETSTORMid:106863
db:PACKETSTORMid:111931
db:PACKETSTORMid:106902
db:PACKETSTORMid:111985
db:CNNVDid:CNNVD-201111-235
db:NVDid:CVE-2011-2460

LAST UPDATE DATE

2024-11-23T20:15:50.995000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-50405date:2018-11-29T00:00:00
db:BIDid:50628date:2015-03-19T09:36:00
db:JVNDBid:JVNDB-2011-002866date:2013-03-27T00:00:00
db:CNNVDid:CNNVD-201111-235date:2011-11-14T00:00:00
db:NVDid:CVE-2011-2460date:2024-11-21T01:28:19.687

SOURCES RELEASE DATE

db:VULHUBid:VHN-50405date:2011-11-11T00:00:00
db:BIDid:50628date:2011-11-09T00:00:00
db:JVNDBid:JVNDB-2011-002866date:2011-11-16T00:00:00
db:PACKETSTORMid:106861date:2011-11-11T15:46:03
db:PACKETSTORMid:106870date:2011-11-11T04:09:07
db:PACKETSTORMid:106863date:2011-11-11T02:51:31
db:PACKETSTORMid:111931date:2012-04-18T07:24:46
db:PACKETSTORMid:106902date:2011-11-12T02:51:52
db:PACKETSTORMid:111985date:2012-04-19T09:17:57
db:CNNVDid:CNNVD-201111-235date:2011-11-14T00:00:00
db:NVDid:CVE-2011-2460date:2011-11-11T16:55:01.693