ID

VAR-201505-0278


CVE

CVE-2015-3083


TITLE

Adobe Flash Player and Adobe AIR Vulnerability that can circumvent restrictions on file system write operations

Trust: 0.8

sources: JVNDB: JVNDB-2015-002612

DESCRIPTION

Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3085. This vulnerability CVE-2015-3082 and CVE-2015-3085 Is a different vulnerability.A third party may be able to circumvent restrictions on write operations on the file system. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2015:1005-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html Issue date: 2015-05-13 CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079 CVE-2015-3080 CVE-2015-3082 CVE-2015-3083 CVE-2015-3084 CVE-2015-3085 CVE-2015-3086 CVE-2015-3087 CVE-2015-3088 CVE-2015-3089 CVE-2015-3090 CVE-2015-3091 CVE-2015-3092 CVE-2015-3093 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. These vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09 listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082, CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087, CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093) A security bypass flaw was found in flash-plugin that could lead to the disclosure of sensitive information. (CVE-2015-3079) Two memory information leak flaws were found in flash-plugin that could allow an attacker to potentially bypass ASLR (Address Space Layout Randomization) protection, and make it easier to exploit other flaws. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09 1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09) 1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.460-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.460-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.460-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.460-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.460-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.460-1.el6_6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.460-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.460-1.el6_6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.460-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.460-1.el6_6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3077 https://access.redhat.com/security/cve/CVE-2015-3078 https://access.redhat.com/security/cve/CVE-2015-3079 https://access.redhat.com/security/cve/CVE-2015-3080 https://access.redhat.com/security/cve/CVE-2015-3082 https://access.redhat.com/security/cve/CVE-2015-3083 https://access.redhat.com/security/cve/CVE-2015-3084 https://access.redhat.com/security/cve/CVE-2015-3085 https://access.redhat.com/security/cve/CVE-2015-3086 https://access.redhat.com/security/cve/CVE-2015-3087 https://access.redhat.com/security/cve/CVE-2015-3088 https://access.redhat.com/security/cve/CVE-2015-3089 https://access.redhat.com/security/cve/CVE-2015-3090 https://access.redhat.com/security/cve/CVE-2015-3091 https://access.redhat.com/security/cve/CVE-2015-3092 https://access.redhat.com/security/cve/CVE-2015-3093 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb15-09.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk hCnlu6h8oa0dBCAE87w7uSg= =Ph69 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460" References ========== [ 1 ] CVE-2015-3044 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044 [ 2 ] CVE-2015-3077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077 [ 3 ] CVE-2015-3078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078 [ 4 ] CVE-2015-3079 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079 [ 5 ] CVE-2015-3080 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080 [ 6 ] CVE-2015-3081 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081 [ 7 ] CVE-2015-3082 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082 [ 8 ] CVE-2015-3083 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083 [ 9 ] CVE-2015-3084 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084 [ 10 ] CVE-2015-3085 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085 [ 11 ] CVE-2015-3086 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086 [ 12 ] CVE-2015-3087 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087 [ 13 ] CVE-2015-3088 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088 [ 14 ] CVE-2015-3089 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089 [ 15 ] CVE-2015-3090 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090 [ 16 ] CVE-2015-3091 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091 [ 17 ] CVE-2015-3092 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092 [ 18 ] CVE-2015-3093 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201505-02 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.25

sources: NVD: CVE-2015-3083 // JVNDB: JVNDB-2015-002612 // BID: 74610 // VULHUB: VHN-81044 // VULMON: CVE-2015-3083 // PACKETSTORM: 131891 // PACKETSTORM: 132095

AFFECTED PRODUCTS

vendor:adobemodel:flash playerscope:eqversion:16.0.0.235

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:16.0.0.257

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:16.0.0.287

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:14.0.0.145

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:17.0.0.134

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:17.0.0.169

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:14.0.0.179

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:15.0.0.167

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:15.0.0.223

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:16.0.0.296

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:14.0.0.176

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:15.0.0.246

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:15.0.0.189

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:15.0.0.239

Trust: 1.0

vendor:adobemodel:airscope:lteversion:17.0.0.144

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:14.0.0.125

Trust: 1.0

vendor:adobemodel:air sdk \& compilerscope:lteversion:17.0.0.144

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:13.0.0.264

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:11.2.202.475

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:15.0.0.152

Trust: 1.0

vendor:adobemodel:air sdkscope:lteversion:17.0.0.144

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:42.0.2311.152 (windows/machintosh/linux)

Trust: 0.8

vendor:adobemodel:airscope:ltversion:desktop runtime 17.0.0.172 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:air sdkscope:ltversion:& compiler 17.0.0.172 (windows/macintosh/android/ios)

Trust: 0.8

vendor:adobemodel:air sdkscope:ltversion:17.0.0.172 (windows/macintosh/android/ios)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:11.2.202.460 (linux)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:17.0.0.188 (internet explorer 10/11)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:17.0.0.188 (windows/machintosh/linux edition chrome)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:desktop runtime 17.0.0.188 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:continuous support release 13.0.0.289 (windows/macintosh)

Trust: 0.8

vendor:microsoftmodel:internet explorerscope:eqversion:10 (windows 8/windows server 2012/windows rt)

Trust: 0.8

vendor:microsoftmodel:internet explorerscope:eqversion:11 (windows 8.1/windows server 2012 r2/windows rt 8.1)

Trust: 0.8

vendor:redmodel:hat enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux server supplementaryscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.53.64

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.51.66

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.452

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.3218

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.22.87

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.15.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.12.36

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.12.35

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.262

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.2460

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.152.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.151.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.124.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.48.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.47.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.45.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.31.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.289.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.283.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.280

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.28.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.277.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.262.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.260.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.246.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.159.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.155.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.115.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:8.0.35.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:8.0.34.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:8

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.73.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.70.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.69.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.68.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.67.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.66.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.61.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.60.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.53.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.24.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.19.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.14.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:6.0.79

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:6.0.21.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.235

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.233

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.229

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.228

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.223

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.8

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.112.61

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.9

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.8

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.5

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.63

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.62

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.55

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.228

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.0.1.152

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.25

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.23

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.22

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.21

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.5

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.10

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.34

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.26

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.23

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.22

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.16

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.14

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.159.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.157.51

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.156.12

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.28

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.27

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.25

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.24

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.18

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.13

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.153.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.33

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.32

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.21

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.95.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.95.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.92.8

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.92.10

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.85.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.82.76

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.52.15

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.52.14.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.106.16

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.105.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.102.65

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.102.64

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.42.34

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.32.18

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.4

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.3

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3.9130

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3.9120

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.2.0.2080

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.2.0.2070

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.1.0.4880

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1.1961

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.19140

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.19120

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.5.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.2.12610

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.01

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.0

Trust: 0.3

sources: BID: 74610 // JVNDB: JVNDB-2015-002612 // CNNVD: CNNVD-201505-196 // NVD: CVE-2015-3083

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3083
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-3083
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201505-196
value: MEDIUM

Trust: 0.6

VULHUB: VHN-81044
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-3083
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-3083
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-81044
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-81044 // VULMON: CVE-2015-3083 // JVNDB: JVNDB-2015-002612 // CNNVD: CNNVD-201505-196 // NVD: CVE-2015-3083

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-81044 // JVNDB: JVNDB-2015-002612 // NVD: CVE-2015-3083

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 132095 // CNNVD: CNNVD-201505-196

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201505-196

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002612

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-81044 // VULMON: CVE-2015-3083

PATCH

title:APSB15-09url:http://helpx.adobe.com/security/products/flash-player/apsb15-09.html

Trust: 0.8

title:APSB15-09url:http://helpx.adobe.com/jp/security/products/flash-player/apsb15-09.html

Trust: 0.8

title:Google Chromeurl:https://www.google.com/intl/ja/chrome/browser/features.html

Trust: 0.8

title:Stable Channel Updateurl:http://googlechromereleases.blogspot.jp/2015/05/stable-channel-update.html

Trust: 0.8

title:Update for Vulnerabilities in Adobe Flash Player in Internet Explorer (2755801)url:https://technet.microsoft.com/en-us/library/security/2755801

Trust: 0.8

title:Internet Explorer 上の Adobe Flash Player の脆弱性に対応する更新プログラム (2755801)url:https://technet.microsoft.com/ja-jp/library/security/2755801

Trust: 0.8

title:アドビ システムズ社 Adobe Flash Player の脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/adobe/20150514f.html

Trust: 0.8

title:flashplayer_17.0.0.188_sa_debugurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=55526

Trust: 0.6

title:flashplayer_17.0.0.188_ax_debugurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=55525

Trust: 0.6

title:flashplayer_13.0.0.289_plugin_debugurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=55524

Trust: 0.6

title:flashplayer_13.0.0.289_ax_debugurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=55523

Trust: 0.6

title:flashplayer_11.2.202.460_plugin_debug.i386url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=55527

Trust: 0.6

title:Red Hat: CVE-2015-3083url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-3083

Trust: 0.1

title:CVE-Studyurl:https://github.com/thdusdl1219/CVE-Study

Trust: 0.1

sources: VULMON: CVE-2015-3083 // JVNDB: JVNDB-2015-002612 // CNNVD: CNNVD-201505-196

EXTERNAL IDS

db:NVDid:CVE-2015-3083

Trust: 3.1

db:BIDid:74610

Trust: 1.5

db:EXPLOIT-DBid:37841

Trust: 1.2

db:SECTRACKid:1032285

Trust: 1.2

db:JVNDBid:JVNDB-2015-002612

Trust: 0.8

db:CNNVDid:CNNVD-201505-196

Trust: 0.7

db:PACKETSTORMid:133158

Trust: 0.1

db:PACKETSTORMid:133168

Trust: 0.1

db:VULHUBid:VHN-81044

Trust: 0.1

db:VULMONid:CVE-2015-3083

Trust: 0.1

db:PACKETSTORMid:131891

Trust: 0.1

db:PACKETSTORMid:132095

Trust: 0.1

sources: VULHUB: VHN-81044 // VULMON: CVE-2015-3083 // BID: 74610 // JVNDB: JVNDB-2015-002612 // PACKETSTORM: 131891 // PACKETSTORM: 132095 // CNNVD: CNNVD-201505-196 // NVD: CVE-2015-3083

REFERENCES

url:https://helpx.adobe.com/security/products/flash-player/apsb15-09.html

Trust: 2.2

url:https://www.exploit-db.com/exploits/37841/

Trust: 1.3

url:https://security.gentoo.org/glsa/201505-02

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2015-1005.html

Trust: 1.3

url:http://www.securityfocus.com/bid/74610

Trust: 1.2

url:http://www.securitytracker.com/id/1032285

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3083

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20150513-adobeflashplayer.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2015/at150013.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3083

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/topics/?seq=16277

Trust: 0.8

url:https://www.adobe.com/software/flash/about/

Trust: 0.3

url:http://www.adobe.com

Trust: 0.3

url:https://technet.microsoft.com/library/security/2755801

Trust: 0.3

url:http://lists.opensuse.org/opensuse-updates/2015-05/msg00030.html

Trust: 0.3

url:https://lwn.net/articles/644864/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-3088

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3084

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3089

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3091

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3086

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3087

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3078

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3079

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3083

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3080

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3093

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3085

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3077

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3090

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3092

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3082

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=39023

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3080

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3092

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3093

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3088

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3089

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3090

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3077

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3079

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3078

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3086

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3085

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3091

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3083

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3084

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3087

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3082

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3077

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3081

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3084

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3080

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3082

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3089

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3090

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3087

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3092

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3083

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3091

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3044

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3079

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3086

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3044

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3093

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3081

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3078

Trust: 0.1

sources: VULHUB: VHN-81044 // VULMON: CVE-2015-3083 // BID: 74610 // JVNDB: JVNDB-2015-002612 // PACKETSTORM: 131891 // PACKETSTORM: 132095 // CNNVD: CNNVD-201505-196 // NVD: CVE-2015-3083

CREDITS

Jietao Yang of KeenTeam, Jihui Lu of KeenTeam and Nicolas Joly working with HP's Zero Day Initiative.

Trust: 0.3

sources: BID: 74610

SOURCES

db:VULHUBid:VHN-81044
db:VULMONid:CVE-2015-3083
db:BIDid:74610
db:JVNDBid:JVNDB-2015-002612
db:PACKETSTORMid:131891
db:PACKETSTORMid:132095
db:CNNVDid:CNNVD-201505-196
db:NVDid:CVE-2015-3083

LAST UPDATE DATE

2024-11-23T20:47:29.951000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-81044date:2017-09-17T00:00:00
db:VULMONid:CVE-2015-3083date:2017-09-17T00:00:00
db:BIDid:74610date:2015-11-03T19:08:00
db:JVNDBid:JVNDB-2015-002612date:2015-05-15T00:00:00
db:CNNVDid:CNNVD-201505-196date:2015-05-14T00:00:00
db:NVDid:CVE-2015-3083date:2024-11-21T02:28:38.087

SOURCES RELEASE DATE

db:VULHUBid:VHN-81044date:2015-05-13T00:00:00
db:VULMONid:CVE-2015-3083date:2015-05-13T00:00:00
db:BIDid:74610date:2015-05-12T00:00:00
db:JVNDBid:JVNDB-2015-002612date:2015-05-15T00:00:00
db:PACKETSTORMid:131891date:2015-05-13T19:45:17
db:PACKETSTORMid:132095date:2015-06-01T23:39:55
db:CNNVDid:CNNVD-201505-196date:2015-05-14T00:00:00
db:NVDid:CVE-2015-3083date:2015-05-13T11:00:15.187