ID

VAR-201505-0280


CVE

CVE-2015-3085


TITLE

Adobe Flash Player and Adobe AIR Vulnerability that can circumvent restrictions on file system write operations

Trust: 0.8

sources: JVNDB: JVNDB-2015-002614

DESCRIPTION

Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3083. This vulnerability CVE-2015-3082 and CVE-2015-3083 Is a different vulnerability.A third party may be able to circumvent restrictions on write operations on the file system. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the BrokerCreateFile method. An attacker can force BrokerCreateFile to traverse the path of the output file, allowing the file to be written anywhere on disk. An attacker can leverage this vulnerability to execute code at medium integrity. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2015:1005-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1005.html Issue date: 2015-05-13 CVE Names: CVE-2015-3077 CVE-2015-3078 CVE-2015-3079 CVE-2015-3080 CVE-2015-3082 CVE-2015-3083 CVE-2015-3084 CVE-2015-3085 CVE-2015-3086 CVE-2015-3087 CVE-2015-3088 CVE-2015-3089 CVE-2015-3090 CVE-2015-3091 CVE-2015-3092 CVE-2015-3093 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. These vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09 listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082, CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087, CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093) A security bypass flaw was found in flash-plugin that could lead to the disclosure of sensitive information. (CVE-2015-3079) Two memory information leak flaws were found in flash-plugin that could allow an attacker to potentially bypass ASLR (Address Space Layout Randomization) protection, and make it easier to exploit other flaws. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1221037 - flash-plugin: multiple code execution issues fixed in APSB15-09 1221054 - CVE-2015-3091 CVE-2015-3092 flash-plugin: information leaks leading to ASLR bypass (APSB15-09) 1221067 - CVE-2015-3079 flash-plugin: security bypass leading to information disclosure (APSB15-09) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.460-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.460-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.460-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.460-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.460-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.460-1.el6_6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.460-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.460-1.el6_6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.460-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.460-1.el6_6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3077 https://access.redhat.com/security/cve/CVE-2015-3078 https://access.redhat.com/security/cve/CVE-2015-3079 https://access.redhat.com/security/cve/CVE-2015-3080 https://access.redhat.com/security/cve/CVE-2015-3082 https://access.redhat.com/security/cve/CVE-2015-3083 https://access.redhat.com/security/cve/CVE-2015-3084 https://access.redhat.com/security/cve/CVE-2015-3085 https://access.redhat.com/security/cve/CVE-2015-3086 https://access.redhat.com/security/cve/CVE-2015-3087 https://access.redhat.com/security/cve/CVE-2015-3088 https://access.redhat.com/security/cve/CVE-2015-3089 https://access.redhat.com/security/cve/CVE-2015-3090 https://access.redhat.com/security/cve/CVE-2015-3091 https://access.redhat.com/security/cve/CVE-2015-3092 https://access.redhat.com/security/cve/CVE-2015-3093 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb15-09.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVU14cXlSAg2UNWIIRAnohAJ9iXHkluxZAUqdBK4kBWtsWKVtoWwCcDcyk hCnlu6h8oa0dBCAE87w7uSg= =Ph69 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460" References ========== [ 1 ] CVE-2015-3044 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044 [ 2 ] CVE-2015-3077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077 [ 3 ] CVE-2015-3078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078 [ 4 ] CVE-2015-3079 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079 [ 5 ] CVE-2015-3080 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080 [ 6 ] CVE-2015-3081 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081 [ 7 ] CVE-2015-3082 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082 [ 8 ] CVE-2015-3083 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083 [ 9 ] CVE-2015-3084 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084 [ 10 ] CVE-2015-3085 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085 [ 11 ] CVE-2015-3086 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086 [ 12 ] CVE-2015-3087 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087 [ 13 ] CVE-2015-3088 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088 [ 14 ] CVE-2015-3089 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089 [ 15 ] CVE-2015-3090 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090 [ 16 ] CVE-2015-3091 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091 [ 17 ] CVE-2015-3092 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092 [ 18 ] CVE-2015-3093 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201505-02 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.88

sources: NVD: CVE-2015-3085 // JVNDB: JVNDB-2015-002614 // ZDI: ZDI-15-216 // BID: 74610 // VULHUB: VHN-81046 // VULMON: CVE-2015-3085 // PACKETSTORM: 131891 // PACKETSTORM: 132095

AFFECTED PRODUCTS

vendor:adobemodel:flash playerscope:eqversion:14.0.0.145

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:15.0.0.152

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:14.0.0.125

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:14.0.0.176

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:14.0.0.179

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:15.0.0.167

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:16.0.0.287

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:16.0.0.296

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:15.0.0.246

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:15.0.0.189

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:17.0.0.169

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:15.0.0.239

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:15.0.0.223

Trust: 1.0

vendor:adobemodel:airscope:lteversion:17.0.0.144

Trust: 1.0

vendor:adobemodel:air sdk \& compilerscope:lteversion:17.0.0.144

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:13.0.0.264

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:17.0.0.134

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:11.2.202.475

Trust: 1.0

vendor:adobemodel:air sdkscope:lteversion:17.0.0.144

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:16.0.0.257

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:16.0.0.235

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:42.0.2311.152 (windows/machintosh/linux)

Trust: 0.8

vendor:adobemodel:airscope:ltversion:desktop runtime 17.0.0.172 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:air sdkscope:ltversion:& compiler 17.0.0.172 (windows/macintosh/android/ios)

Trust: 0.8

vendor:adobemodel:air sdkscope:ltversion:17.0.0.172 (windows/macintosh/android/ios)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:11.2.202.460 (linux)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:17.0.0.188 (internet explorer 10/11)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:17.0.0.188 (windows/machintosh/linux edition chrome)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:desktop runtime 17.0.0.188 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:continuous support release 13.0.0.289 (windows/macintosh)

Trust: 0.8

vendor:microsoftmodel:internet explorerscope:eqversion:10 (windows 8/windows server 2012/windows rt)

Trust: 0.8

vendor:microsoftmodel:internet explorerscope:eqversion:11 (windows 8.1/windows server 2012 r2/windows rt 8.1)

Trust: 0.8

vendor:adobemodel:flash playerscope: - version: -

Trust: 0.7

vendor:adobemodel:flash playerscope:eqversion:13.0.0.264

Trust: 0.6

vendor:adobemodel:air sdkscope:eqversion:17.0.0.144

Trust: 0.6

vendor:adobemodel:air sdk \& compilerscope:eqversion:17.0.0.144

Trust: 0.6

vendor:adobemodel:airscope:eqversion:17.0.0.144

Trust: 0.6

vendor:redmodel:hat enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux server supplementaryscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.53.64

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.51.66

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.452

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.3218

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.22.87

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.15.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.12.36

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.12.35

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.262

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.2460

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.152.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.151.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.124.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.48.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.47.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.45.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.31.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.289.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.283.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.280

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.28.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.277.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.262.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.260.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.246.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.159.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.155.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.115.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:8.0.35.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:8.0.34.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:8

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.73.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.70.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.69.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.68.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.67.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.66.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.61.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.60.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.53.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.24.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.19.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.14.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:6.0.79

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:6.0.21.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.235

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.233

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.229

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.228

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.223

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.8

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.112.61

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.9

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.8

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.5

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.63

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.62

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.55

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.228

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.0.1.152

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.25

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.23

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.22

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.21

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.5

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.10

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.34

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.26

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.23

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.22

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.16

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.14

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.159.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.157.51

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.156.12

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.28

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.27

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.25

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.24

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.18

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.13

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.153.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.33

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.32

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.21

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.95.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.95.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.92.8

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.92.10

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.85.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.82.76

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.52.15

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.52.14.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.106.16

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.105.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.102.65

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.102.64

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.42.34

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.32.18

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.4

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.3

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3.9130

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3.9120

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.2.0.2080

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.2.0.2070

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.1.0.4880

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1.1961

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.19140

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.19120

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.5.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.2.12610

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.01

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.0

Trust: 0.3

sources: ZDI: ZDI-15-216 // BID: 74610 // JVNDB: JVNDB-2015-002614 // CNNVD: CNNVD-201505-198 // NVD: CVE-2015-3085

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3085
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-3085
value: MEDIUM

Trust: 0.8

ZDI: CVE-2015-3085
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-201505-198
value: MEDIUM

Trust: 0.6

VULHUB: VHN-81046
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-3085
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-3085
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

ZDI: CVE-2015-3085
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-81046
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-15-216 // VULHUB: VHN-81046 // VULMON: CVE-2015-3085 // JVNDB: JVNDB-2015-002614 // CNNVD: CNNVD-201505-198 // NVD: CVE-2015-3085

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-81046 // JVNDB: JVNDB-2015-002614 // NVD: CVE-2015-3085

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 132095 // CNNVD: CNNVD-201505-198

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201505-198

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002614

PATCH

title:APSB15-09url:http://helpx.adobe.com/security/products/flash-player/apsb15-09.html

Trust: 0.8

title:APSB15-09url:http://helpx.adobe.com/jp/security/products/flash-player/apsb15-09.html

Trust: 0.8

title:Google Chromeurl:https://www.google.com/intl/ja/chrome/browser/features.html

Trust: 0.8

title:Stable Channel Updateurl:http://googlechromereleases.blogspot.jp/2015/05/stable-channel-update.html

Trust: 0.8

title:Update for Vulnerabilities in Adobe Flash Player in Internet Explorer (2755801)url:https://technet.microsoft.com/en-us/library/security/2755801

Trust: 0.8

title:Internet Explorer 上の Adobe Flash Player の脆弱性に対応する更新プログラム (2755801)url:https://technet.microsoft.com/ja-jp/library/security/2755801

Trust: 0.8

title:アドビ システムズ社 Adobe Flash Player の脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/adobe/20150514f.html

Trust: 0.8

title:Adobe has issued an update to correct this vulnerability.url:https://helpx.adobe.com/security/products/reader/apsb15-10.html

Trust: 0.7

title:CVE-Studyurl:https://github.com/thdusdl1219/CVE-Study

Trust: 0.1

sources: ZDI: ZDI-15-216 // VULMON: CVE-2015-3085 // JVNDB: JVNDB-2015-002614

EXTERNAL IDS

db:NVDid:CVE-2015-3085

Trust: 3.8

db:ZDIid:ZDI-15-216

Trust: 1.9

db:BIDid:74610

Trust: 1.5

db:SECTRACKid:1032285

Trust: 1.2

db:JVNDBid:JVNDB-2015-002614

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2820

Trust: 0.7

db:CNNVDid:CNNVD-201505-198

Trust: 0.7

db:VULHUBid:VHN-81046

Trust: 0.1

db:VULMONid:CVE-2015-3085

Trust: 0.1

db:PACKETSTORMid:131891

Trust: 0.1

db:PACKETSTORMid:132095

Trust: 0.1

sources: ZDI: ZDI-15-216 // VULHUB: VHN-81046 // VULMON: CVE-2015-3085 // BID: 74610 // JVNDB: JVNDB-2015-002614 // PACKETSTORM: 131891 // PACKETSTORM: 132095 // CNNVD: CNNVD-201505-198 // NVD: CVE-2015-3085

REFERENCES

url:https://helpx.adobe.com/security/products/flash-player/apsb15-09.html

Trust: 2.2

url:http://www.securityfocus.com/bid/74610

Trust: 1.3

url:https://security.gentoo.org/glsa/201505-02

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2015-1005.html

Trust: 1.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-216

Trust: 1.2

url:http://www.zerodayinitiative.com/advisories/zdi-15-216/

Trust: 1.2

url:http://www.securitytracker.com/id/1032285

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3085

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20150513-adobeflashplayer.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2015/at150013.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3085

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/topics/?seq=16277

Trust: 0.8

url:https://helpx.adobe.com/security/products/reader/apsb15-10.html

Trust: 0.7

url:https://www.adobe.com/software/flash/about/

Trust: 0.3

url:http://www.adobe.com

Trust: 0.3

url:https://technet.microsoft.com/library/security/2755801

Trust: 0.3

url:http://lists.opensuse.org/opensuse-updates/2015-05/msg00030.html

Trust: 0.3

url:https://lwn.net/articles/644864/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-3088

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3084

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3089

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3091

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3086

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3087

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3078

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3079

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3083

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3080

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3093

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3085

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3077

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3090

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3092

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3082

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/thdusdl1219/cve-study

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3080

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3092

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3093

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3088

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3089

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3090

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3077

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3079

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3078

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3086

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3085

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3091

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3083

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3084

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3087

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3082

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3077

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3081

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3084

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3080

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3082

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3089

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3090

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3087

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3092

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3083

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3091

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3044

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3079

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3086

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3044

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3093

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3088

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3081

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3078

Trust: 0.1

sources: ZDI: ZDI-15-216 // VULHUB: VHN-81046 // VULMON: CVE-2015-3085 // BID: 74610 // JVNDB: JVNDB-2015-002614 // PACKETSTORM: 131891 // PACKETSTORM: 132095 // CNNVD: CNNVD-201505-198 // NVD: CVE-2015-3085

CREDITS

Nicolas Joly

Trust: 0.7

sources: ZDI: ZDI-15-216

SOURCES

db:ZDIid:ZDI-15-216
db:VULHUBid:VHN-81046
db:VULMONid:CVE-2015-3085
db:BIDid:74610
db:JVNDBid:JVNDB-2015-002614
db:PACKETSTORMid:131891
db:PACKETSTORMid:132095
db:CNNVDid:CNNVD-201505-198
db:NVDid:CVE-2015-3085

LAST UPDATE DATE

2024-11-23T19:48:39.235000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-15-216date:2015-05-12T00:00:00
db:VULHUBid:VHN-81046date:2017-01-03T00:00:00
db:VULMONid:CVE-2015-3085date:2017-01-03T00:00:00
db:BIDid:74610date:2015-11-03T19:08:00
db:JVNDBid:JVNDB-2015-002614date:2015-05-15T00:00:00
db:CNNVDid:CNNVD-201505-198date:2015-05-15T00:00:00
db:NVDid:CVE-2015-3085date:2024-11-21T02:28:38.353

SOURCES RELEASE DATE

db:ZDIid:ZDI-15-216date:2015-05-12T00:00:00
db:VULHUBid:VHN-81046date:2015-05-13T00:00:00
db:VULMONid:CVE-2015-3085date:2015-05-13T00:00:00
db:BIDid:74610date:2015-05-12T00:00:00
db:JVNDBid:JVNDB-2015-002614date:2015-05-15T00:00:00
db:PACKETSTORMid:131891date:2015-05-13T19:45:17
db:PACKETSTORMid:132095date:2015-06-01T23:39:55
db:CNNVDid:CNNVD-201505-198date:2015-05-14T00:00:00
db:NVDid:CVE-2015-3085date:2015-05-13T11:00:16.830